Skip to main content

Data Mining: Min–Max Normalization Based Data Perturbation Technique for Privacy Preservation

  • Conference paper
  • First Online:
Proceedings of the Third International Conference on Computational Intelligence and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1090))

Abstract

Data mining system deals with huge volume of information which may include personal and sensitive information about the individuals such as bank credential details, financial records, health-related information, etc. Data mining process utilizes this information for analyzing purpose but privacy preservation of such sensitive data is very much crucial in data mining process in ordered to prevent the privacy about the individuals. In recent years, privacy preservation is an ongoing research topic because of the high availability of personal data which consist of private and sensitive information about the individuals. Data perturbation technique is a well-known data modification technique to preserve the privacy of sensitive values and achieves accurate data mining results. In data perturbation method, original data is perturbed (modified) before the data mining process begins. In the existing method, data modification is takes place by adding noise (Gaussian) to the original data. In this method, loss of data loss is little high, and to overcome such issue, proposed method is established. In this paper, min–max normalization-based data transformation method is used to protect the sensitive information in a dataset as well as to achieve good data mining results. The proposed method is applied on the adult dataset and the accuracy of the results is compared with Naïve Bayes classification algorithm and J48 decision tree algorithm with minimum information loss by having high data utilization. The performance of the proposed method is examined with two major considerations like maintaining the accuracy of the data mining application along with privacy preservation of original data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, M., J. Han, and P. Yu. 1996. Data Mining: An Overview from a Database Prospective. IEEE Transaction on Knowledge and Data Engineering 8 (6): 866–883.

    Article  Google Scholar 

  2. Chen, C.L.P., and C.Y. Zhang. 2014. Data Intensive applications, challenges, Techniques and technologies: A survey on Big Data. Information Sciences 275: 314–347.

    Article  Google Scholar 

  3. Atallah, M., A. Elmagarmid, M. Ibrahim, E. Bertino, and V. Verykios. 1999. Disclosure Limitation Of Sensitive Rules. In Workshop on Knowledge and Data Engineering Exchange.

    Google Scholar 

  4. Agrawal, R., and R. Srikant. 2000. Privacy-preserving Data Mining. In Proceeding of the ACM SIGMOD Conference on Management of Data, 439–450, Dallas, Texas, U.S.A.

    Google Scholar 

  5. Mahalle, V.S., Pankaj Jogi, Shubham Purankar, Samiksha Pinge, and Urvashi Ingale. 2017. Data Privacy Preserving using Perturbation Technique. Asian Journal of Convergence in Technology III(III). ISSN No.:2350–1146, I.F-2.71.

    Google Scholar 

  6. Patel, Nikunj Kumar. 2015. Data Mining: Privacy Preservation Using Perturbation Technique.

    Google Scholar 

  7. Senosi, Aobakwe, and George Sibiya. 2017. Classification and Evaluation of Privacy Preserving Data Mining: A Review. IEEE.

    Google Scholar 

  8. Vaghashia, Hina, and Amit Ganatra. 2015. A Survey: Privacy Preservation Techniques in Data Mining. In Proceedings of International Journal of Computer Applications (0975 – 8887) 119(4).

    Google Scholar 

  9. Sweeney, L. 2012. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10 (05): 557–570.

    Google Scholar 

  10. Chen, K., and Liu, L. 2005. A random rotation perturbation approach to privacy preserving data classification. In Proceedings of International Conference on Data Mining (ICDM), IEEE, Houston, TX.

    Google Scholar 

  11. Wang, J., Zhong, W., and Zhang, J. 2006. NNMF-based factorization techniques for high-accuracy privacy protection on non-negative-valued datasets. In Sixth IEEE International Conference on Data Mining - Workshops (ICDMW’06), 18–22 Dec. https://doi.org/10.1109/ICDMW.2006.123.

  12. Liu, L., Wang, J., and Zhang, J. 2008. Wavelet-based data perturbation for simultaneous privacy-preserving and statistics-preserving. In 2008 IEEE International Conference on Data Mining Workshops, 15–19 Dec. https://doi.org/10.1109/ICDMW.2008.77.

  13. Peng, B., Geng, X., and Zhang, J. 2010. Combined data distortion strategies for privacy-preserving data mining. In 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 20–22 Aug. https://doi.org/10.1109/ICACTE.2010.5578952.

  14. Jain, Y.K., and Bhandare, S.K. 2011. A study on normalization techniques for privacy preserving data mining. In Proceedings of International Journal of Computer & communication Technology, 2 (VIII).

    Google Scholar 

  15. Manikandan, G., Sairam, N., Sudhan, R., and Vaishnavi, B. 2012. Shearing based data transformation approach for privacy preserving clustering. In Third International Conference on Computing,Communication and Networking Technologies (ICCCNT-2012), July 26–28. SNS College of Engineering, Coimbatore.

    Google Scholar 

  16. Manikandan, G., Sairam, N., Sharmili S., and Venkatakrishnan S. 2013. Data masking – a few new techniques. In International Conference on Research and Development Prospects on Engineering and Technology (ICRDPET-2013), March 29–30. E.G.S Pillay Engineering college, Nagapattinam.

    Google Scholar 

  17. Rajalaxmi, R.R., and A.M. Natarajan. 2008. An Effective Data Transformation Approach for Privacy Preserving Clustering. Journal of Computer Science 4 (4): 320–326.

    Article  Google Scholar 

  18. Jain, Yogendra Kumar, and Santosh Kumar Bhandare. 2011. A Study on Normalization Techniques for Privacy Preserving Data Mining. In Proceedings of International Journal of Computer & communication Technology 2(VIII).

    Google Scholar 

  19. Saranya, C., and G. Manikandan. 2016. A Study on Normalization Techniques for Privacy Preserving Data Mining. Proceedings of International Journal of Engineering and Technology (IJET) 5 (3): 2701.

    Google Scholar 

  20. Mendes, Ricardo, and Joao P. Vilela. 2017. Privacy-Preserving Data Mining: Methods, Metrics, and Applications, 27 June 2017.

    Google Scholar 

  21. Kabir, Saif M.A., Amr M. Youssef, and Ahmed K. Elhakeem. 2007. On Data Distortion for Privacy Preserving Data Mining. In Proceedings of IEEE Conference on Electrical and Computer Engineering (CCECE 2007), 308–311.

    Google Scholar 

  22. Xu, S., J. Zhang, D. Han, and J. Wang. 2005. Data Distortion for Privacy Protection in a Terrorist Analysis System. In Proceeding of the IEEE International Conference on Intelligence and Security Informatics, 459–464.

    Google Scholar 

  23. UCI Machine Learning Repository. http://archive.ics.uci.edu/ml/datasets.htm.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajmeera Kiran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kiran, A., Vasumathi, D. (2020). Data Mining: Min–Max Normalization Based Data Perturbation Technique for Privacy Preservation. In: Raju, K., Govardhan, A., Rani, B., Sridevi, R., Murty, M. (eds) Proceedings of the Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. https://doi.org/10.1007/978-981-15-1480-7_66

Download citation

Publish with us

Policies and ethics