Abstract
Data mining system deals with huge volume of information which may include personal and sensitive information about the individuals such as bank credential details, financial records, health-related information, etc. Data mining process utilizes this information for analyzing purpose but privacy preservation of such sensitive data is very much crucial in data mining process in ordered to prevent the privacy about the individuals. In recent years, privacy preservation is an ongoing research topic because of the high availability of personal data which consist of private and sensitive information about the individuals. Data perturbation technique is a well-known data modification technique to preserve the privacy of sensitive values and achieves accurate data mining results. In data perturbation method, original data is perturbed (modified) before the data mining process begins. In the existing method, data modification is takes place by adding noise (Gaussian) to the original data. In this method, loss of data loss is little high, and to overcome such issue, proposed method is established. In this paper, min–max normalization-based data transformation method is used to protect the sensitive information in a dataset as well as to achieve good data mining results. The proposed method is applied on the adult dataset and the accuracy of the results is compared with Naïve Bayes classification algorithm and J48 decision tree algorithm with minimum information loss by having high data utilization. The performance of the proposed method is examined with two major considerations like maintaining the accuracy of the data mining application along with privacy preservation of original data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, M., J. Han, and P. Yu. 1996. Data Mining: An Overview from a Database Prospective. IEEE Transaction on Knowledge and Data Engineering 8 (6): 866–883.
Chen, C.L.P., and C.Y. Zhang. 2014. Data Intensive applications, challenges, Techniques and technologies: A survey on Big Data. Information Sciences 275: 314–347.
Atallah, M., A. Elmagarmid, M. Ibrahim, E. Bertino, and V. Verykios. 1999. Disclosure Limitation Of Sensitive Rules. In Workshop on Knowledge and Data Engineering Exchange.
Agrawal, R., and R. Srikant. 2000. Privacy-preserving Data Mining. In Proceeding of the ACM SIGMOD Conference on Management of Data, 439–450, Dallas, Texas, U.S.A.
Mahalle, V.S., Pankaj Jogi, Shubham Purankar, Samiksha Pinge, and Urvashi Ingale. 2017. Data Privacy Preserving using Perturbation Technique. Asian Journal of Convergence in Technology III(III). ISSN No.:2350–1146, I.F-2.71.
Patel, Nikunj Kumar. 2015. Data Mining: Privacy Preservation Using Perturbation Technique.
Senosi, Aobakwe, and George Sibiya. 2017. Classification and Evaluation of Privacy Preserving Data Mining: A Review. IEEE.
Vaghashia, Hina, and Amit Ganatra. 2015. A Survey: Privacy Preservation Techniques in Data Mining. In Proceedings of International Journal of Computer Applications (0975 – 8887) 119(4).
Sweeney, L. 2012. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10 (05): 557–570.
Chen, K., and Liu, L. 2005. A random rotation perturbation approach to privacy preserving data classification. In Proceedings of International Conference on Data Mining (ICDM), IEEE, Houston, TX.
Wang, J., Zhong, W., and Zhang, J. 2006. NNMF-based factorization techniques for high-accuracy privacy protection on non-negative-valued datasets. In Sixth IEEE International Conference on Data Mining - Workshops (ICDMW’06), 18–22 Dec. https://doi.org/10.1109/ICDMW.2006.123.
Liu, L., Wang, J., and Zhang, J. 2008. Wavelet-based data perturbation for simultaneous privacy-preserving and statistics-preserving. In 2008 IEEE International Conference on Data Mining Workshops, 15–19 Dec. https://doi.org/10.1109/ICDMW.2008.77.
Peng, B., Geng, X., and Zhang, J. 2010. Combined data distortion strategies for privacy-preserving data mining. In 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 20–22 Aug. https://doi.org/10.1109/ICACTE.2010.5578952.
Jain, Y.K., and Bhandare, S.K. 2011. A study on normalization techniques for privacy preserving data mining. In Proceedings of International Journal of Computer & communication Technology, 2 (VIII).
Manikandan, G., Sairam, N., Sudhan, R., and Vaishnavi, B. 2012. Shearing based data transformation approach for privacy preserving clustering. In Third International Conference on Computing,Communication and Networking Technologies (ICCCNT-2012), July 26–28. SNS College of Engineering, Coimbatore.
Manikandan, G., Sairam, N., Sharmili S., and Venkatakrishnan S. 2013. Data masking – a few new techniques. In International Conference on Research and Development Prospects on Engineering and Technology (ICRDPET-2013), March 29–30. E.G.S Pillay Engineering college, Nagapattinam.
Rajalaxmi, R.R., and A.M. Natarajan. 2008. An Effective Data Transformation Approach for Privacy Preserving Clustering. Journal of Computer Science 4 (4): 320–326.
Jain, Yogendra Kumar, and Santosh Kumar Bhandare. 2011. A Study on Normalization Techniques for Privacy Preserving Data Mining. In Proceedings of International Journal of Computer & communication Technology 2(VIII).
Saranya, C., and G. Manikandan. 2016. A Study on Normalization Techniques for Privacy Preserving Data Mining. Proceedings of International Journal of Engineering and Technology (IJET) 5 (3): 2701.
Mendes, Ricardo, and Joao P. Vilela. 2017. Privacy-Preserving Data Mining: Methods, Metrics, and Applications, 27 June 2017.
Kabir, Saif M.A., Amr M. Youssef, and Ahmed K. Elhakeem. 2007. On Data Distortion for Privacy Preserving Data Mining. In Proceedings of IEEE Conference on Electrical and Computer Engineering (CCECE 2007), 308–311.
Xu, S., J. Zhang, D. Han, and J. Wang. 2005. Data Distortion for Privacy Protection in a Terrorist Analysis System. In Proceeding of the IEEE International Conference on Intelligence and Security Informatics, 459–464.
UCI Machine Learning Repository. http://archive.ics.uci.edu/ml/datasets.htm.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kiran, A., Vasumathi, D. (2020). Data Mining: Min–Max Normalization Based Data Perturbation Technique for Privacy Preservation. In: Raju, K., Govardhan, A., Rani, B., Sridevi, R., Murty, M. (eds) Proceedings of the Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. https://doi.org/10.1007/978-981-15-1480-7_66
Download citation
DOI: https://doi.org/10.1007/978-981-15-1480-7_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1479-1
Online ISBN: 978-981-15-1480-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)