Abstract
The rapid development in current information explosion has led to huge growth in data over time. Increase in internet and communication technology has resulted into generation of data streams. Due to its dynamic nature, the traditional techniques are not sufficient for privacy preservation of data streams. Researchers have been exploring alternative algorithms to achieve improved privacy of data streams. This paper proposes a novel approach to achieve reliable privacy preservation along with an efficient method for reverse engineering. The hashing based privacy preservation proposed in this paper optimizes the use of memory, reduces response time and shows high privacy level. Further the classification of the secured data obtained from this technique has also been analysed for the future behaviour of the data stream using appropriate tools.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fung, B., Wang, K., Yu, P.: Anonymizing classification data for privacy preservation. IEEE Trans. Knowl. Data 19, 711–725 (2007)
Chhinkaniwala, H., Patel, K., Garg, S.: Privacy preserving data stream classification using data perturbation techniques. In: Proceedings of International Conference on Emerging Trends in Electrical, Electronics and Communication Technologies, pp. 1–8 (2012)
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of ACM SIGMOD/PODS Conference, pp. 211–222 (2003)
Aggarwal, Charu C., Yu, Philip S.: A condensation approach to privacy preserving data mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 183–199. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24741-8_12
Denning, D.: Cryptography and Data Security. Addison-Wesley, Boston (1982)
Ringne, A.G., Sood, D., Toshniwal, D.: Compression and privacy preservation of data streams using moments. Int. J. Mach. Learn. Comput. 1, 473–478 (2011)
Bertino, E., Lin, D., Jiang, W.: A survey of quantification of privacy preserving data mining algorithms. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining, pp. 183–205. Springer, Boston (2008)
Jena, L., Kamila, N., Mishra, S.: Optimizing the convergence of data utility and privacy in data mining. Int. J. Appl. Innov. Eng. Manag. 2(1), 155–165 (2013)
Trambadiya, J., Bhanodia, P.: A heuristic approach to preserve privacy in stream data with classification. Int. J. Eng. Res. Appl. 3, 1096–1103 (2013)
Patel, M., Richariya, P., Shrivastava, A.: Privacy preserving using randomization and encryption methods. Sch. J. Eng. Tech. 1, 117–121 (2013)
Brijlal, P., Shah, A.: An overview of privacy preserving techniques and data accuracy. Int. J. Adv. Res. Comput. Sci. Manag. Stud. 3, 135–140 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nyati, A., Dargar, S.K., Sharda, S. (2018). Design and Implementation of a New Model for Privacy Preserving Classification of Data Streams. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, vol 906. Springer, Singapore. https://doi.org/10.1007/978-981-13-1813-9_45
Download citation
DOI: https://doi.org/10.1007/978-981-13-1813-9_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1812-2
Online ISBN: 978-981-13-1813-9
eBook Packages: Computer ScienceComputer Science (R0)