Abstract
Data mining methods analyze the patterns found in data, irrespective of the confidential information of an individual. It has led to raise privacy concerns about confidential data. Different methods are inhibited in data mining to protect these data. Privacy preserving data mining plays a major role in protecting confidential data. The paper focuses on data perturbation method to preserve confidential data present in the real-world datasets. These identified confidential data are perturbed using fuzzy membership function (FMF) and obtains fuzzy data. The mining utility such as classification and clustering methods are used. The accuracy is determined and compared between an original data and fuzzy data. The results shown in the paper proves the proposed method is efficient in preserving confidential data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
R. Agrawal and R. srikant “Privacy–Preserving data mining”, In proceedings of the 2000 ACM SIGMOD International Conference on management of data, pp 86–97, San Diego, CA, 2003.
V. Estvill–Castro, L. Brankovic, D.L. Dowe, “Privacy in datamining”, Australian Computer Society NSW Branch, Australia, Available at www.acs.org.au/nsw/articles/199082.html.
J. Wang, W. Zhong, S. Xu, J. Zhang. “Selective Data Distortion via Structural Partition and SSVD for privacy Preseervation”, In Proceedings of the 2006 International Conference on Information & knowledge Engineering, pp: 114–120, CSREA Press, Las Vegas.
R. Agrawal, A. Evfimieski and R. Srikanth. “Information sharing across private databases”. In proceedings’ of the 2003 ACM SIGMOD International Conference on management of data, pp. 86–97, San Diego, CA, 2003.
S. Xu, J. Zhang, D. Han, J. Wang. Data distortion for privacy protection in a terrorist analysis system. in: Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, 2005, 459–464.
Thanveer, G. Narasimha and C.V. Guru Rao “Data Perturbation and Feature selection in Preserving Privacy” In Proceeding of the 2012 Ninth International conference in wireless and optical communication networks (WOCN), Indore, Madhya Pradesh, India. IEEE catalog number: CFP12604-CDR, ISBN: 978-1-4673-1989-8/12.
T. Jahan, G. Narsimha, C.V Guru Rao, Privacy preserving clustering on distorted data in International Organization of Scientific Research. J. Comput. Eng. ISSN: 2278–0661, ISBN: 2278–8727 5(2), 25–29 (2012).
Thanveer Jahan, Dr. G. Narsimha, Dr. C.V. Guru Rao “A Hybrid Data Perturbation Approach To Preserve Privacy” International Journal of Scientific & Engineering Research, Volume 6, Issue 6, June-2015 1528 ISSN 2229-5518.
B. Gillburd, A. Schuster and R. Wolff. “K-TTP: A new Privacy model for large–scale distributed environments”. In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (kdd’04), Seattle, WA, USA, 2004.
B. Karthikeyan, G. Manikandan, V. Vaithiyanathan, A fuzzy based approach for privacy preserving clustering. J. Theor. Appl. Inf. Technol. 32(2), 118–122 (2011).
V. Vallikumari, S. Srinivasa Rao, KVSVN Raju, KV Ramana, BVS Avadhani “Fuzzy based approach for privacy preserving publication of data”, IJCSNS, Vol. 8 No. 1, January 2008.
P. Kamakshi, A. Vinaya Babu, “A Novel Framework to Improve the Quality of Additive Perturbation Technique”, In proceeding of International Journal of Computer Applications, Volume 30, No. 6, September 2011.
Aggarwal, C. C. and Yu, P. S. (2004), A condensation approach to privacy preserving data mining, in ‘Proceedings of International Conference on Extending Database Technology (EDBT)’, Vol. 2992, Springer, Heraklion, Crete, Greece, pp. 183–199.
Zadeh L “Fuzzy sets”, Inf. Control. Vol. 8, PP, 338–353, 1965.
Thanveer Jahan, G. Narasimha, and C.V. Guru Rao “A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy” Networks and Communications (NetCom2013), Lecture Notes in Electrical Engineering 284, https://doi.org/10.1007/978-3-31903692-2_13, © Springer International Publishing Switzerland 2014.
Ishibuchi H., Yamamoto T.: Comparison of heuristic criteria for fuzzy rule selection in classification problems. Fuzzy Optimization and Decision Making, Vol 3, No. 2, 119–139, (2004).
K. Chen, and L. Liu, A Random Rotation Perturbation Approach to Privacy Data Classification, In Proc of IEEE Intl. Conf. on Data Mining (ICDM), pp. 589–592, 2005.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jahan, T., Pavani, K., Narsimha, G., Guru Rao, C.V. (2018). A Data Perturbation Method to Preserve Privacy Using Fuzzy Rules. In: Bhateja, V., Tavares, J., Rani, B., Prasad, V., Raju, K. (eds) Proceedings of the Second International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 712. Springer, Singapore. https://doi.org/10.1007/978-981-10-8228-3_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-8228-3_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8227-6
Online ISBN: 978-981-10-8228-3
eBook Packages: EngineeringEngineering (R0)