Data Privacy Preserving using Perturbation Technique

  • Prof. V. S. Mahalle
  • Pankaj Jogi
  • Urvashi Ingale
  • Shubham Purankar
  • Samiksha Pinge
Keywords: Privacy preservation, Geometric data perturbation, Random perturbation, Rotation perturbation

Abstract

Data Mining mainly consist of the discovery of structures, associations and the events in the data. In order to analyze the data related to sector like healthcare, privacy of data is to be maintained. In order to maintain the privacy of data, a perturbation technique is applied on original dataset and a new dataset is formed which is different from original dataset. Data mining can be performed on this perturbed dataset for various surveys and analysis. In this paper, perturbation technique algorithm is explained step by step in order to preserve the privacy of data.

References

[1]. Krupali N. Vachhani, Prof. Dinesh Vaghela, “A Survey on Geometric Data Transformation for privacy preserving on data stream” International Journal of Technical Research and Applications eISSN: 2320-8163, Volume 3, Issue 2 (Mar-Apr 2015), PP. 257-259.
[2]. Kun Liu, HillolKargupta, Senior Member, IEEE, and Jessica Ryan, “Random Projection Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining”, IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 1, january 2006, p.92.
[3]. Twinkle Ankleshwaria, Prof. J. S. Dhobi,” Geometric Data Perturbation Approach for Privacy Preserving in data Stream Mining” Engineering Universe for Scientific research and Management, Impact factor 3.7, Volume 6, Issue 4, April 2014. [4]. Hitesh Chhikaniwala [Ganpat University, India], Dr. Sanjay Garg [Nirma University, India],”Privacy Preserving Data Mining Techniques: Challenges and Issues”.
[5]. Kun Liu, Hillol Kargupta, Senior Member, IEEE and Jessica Ryan, “Random Projection based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining”, IEEE transaction on knowledge, Vol. 18, No. 1, January 2006.
[6]. Stanley R. M. Oliveria, Osmar R. Zaiane, “Data Perturbation by rotation for privacy preserving Clustering”, Technical Report TR 04-17, August 2004.
[7]. Prashant Lahane, R K Bedi, Prasad Halgaonkar, “Data Stream Mining”, International Journal of Advances in computing and Information Researches, ISSN:2277-4068, Volume 1-No. 1, January 2012.
[8]. Keke Chen [Dept. of CSE, Wright state university, Dayton], Ling Liu [CCGIT,Atlanta, GA], “Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining”, [Online Available:http://knoesis.wright.edu/library/downloa d/geometric_perturbation.pdf]. [9]. Ms. Ompriya Kale, Ms. Prachi Patel, "A Survey on Privacy Preserving Data Mining Techniques”, Global journal of Advanced Engineering Technologies, ISSN: 2277-6370, vol2, Issue3-2013. [10]. Neha Gupta, Indrajeet Rajput, ”Preserving privacy using data perturbation in Data Stream” International Journal of advanced Research in computer engineering & technology (IJARCET) Volume 2, No. 5, May 2013.
[11]. Yabo Xu, Ke Wang, Ada Wai-Chee Fu,Rong She, and Jian Pei, Privacy-Preserving Data Stream Classification, springer,pp.489-510(2008).
[12]. Charu C. Aggarwal and Philip S. Yu, “A Condensation Approach to Privacy Preserving Data Mining”, IBM T. J. Watson Research Center, Hawthorne, NY.
[13]. R.VidyaBanu and N.Nagaveni,” Preservation of Data Privacy using PCA based Transformation”,2009 International Conference on Advances in Recent Technologies in Communication and Computing, in 2009 IEEE computer society,p.439. [14]. T. Jahan, G.Narsimha and C.V Guru Rao, “Data Perturbation and Features Selection in Preserving Privacy” in proceedings of 978-1-4673-1989-8/12, IEEE 2012. [15]. S. Lohiya and L. Ragha, “Privacy Preserving In Data Mining Using Hybrid Approach” proceedings of 2012 Fourth International Conference on Computational Intelligence and Communication Networks, IEEE 2012.
Published
2018-01-07
How to Cite
Mahalle, P. V., Jogi, P., Ingale, U., Purankar, S., & Pinge, S. (2018). Data Privacy Preserving using Perturbation Technique. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 3(3). Retrieved from http://www.asianssr.org/index.php/ajct/article/view/281
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.