Abstract
This paper addresses the data privacy based on interactive computation using an optimization model in data mining. When data are computed or sharing among users in online, it needs to maintain privacy for all computation during sharing of data. But user choice-based privacy is not available when sharing of data is required for data mining computation which is a big challenge for data privacy. Thus, we proposed the framework for anonymity of data privacy using various methods of multi-objective models as per the requirement of privacy. The proposed framework is designed with the help of two objects such as computational cost and privacy based on optimization model. Our framework maintains the balance between above objects as per user demands, i.e., increasing the privacy with decreasing the computational cost. In this model, the domain of privacy and computational cost for optimization problem solves the entity privacy requirements in a computing environment. We have used various methods such as Gaussian and uniform distribution, confidence interval, activation function, linear membership function with distinguish manner for maintaining of privacy and cost. As per the uniform distribution and parameter α-cut value for noise data, the optimal value is made accordingly. Example: for α = 0.2, and uniform distribution (− 1, 1), the optimal value is 0.0058. Similarly, as per different α values, classifiers result is different like α = 0.2 and 0.4, Multilayer perceptron values are 4.01 and 1.61 respectively. The solution of the proposed model controls the amount of privacy with complete freedom of choice of users with utmost flexibility.
Similar content being viewed by others
Data availability
Data will be made available on reasonable request.
References
Alzubi, O.A., Alzubi, J.A., Al-Zoubi, A.M., Hassonah, M.A., Kose, U.: An efficient malware detection approach with feature weighting based on Harris Hawks optimization. Clust. Comput. J. (2021). https://doi.org/10.1007/s10586-021-03459-1
Movassagh, A.A., Alzubi, J.A., Gheisari, M., Rahimi, M., Mohan, S., Abbasi, A.A., Nabipour, N.: Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model. J. Ambient Intell. Humniz. Comput. (2021). https://doi.org/10.1007/s12652-020-02623-6
Gheisari, M., Alzubi, J., Zhang, X., Kose, U., Saucedo, J.A.M.: A new algorithm for optimization of quality of service in peer to peer wireless mesh networks. Wirel. Netw. 26, 4965–4973 (2020). https://doi.org/10.1007/s11276-019-01982-z
Cadenas, J.M., Verdegy, J.L.: A primer on fuzzy optimization models and methods. Iran. J. Fuzzy Syst. 3(1), 1–21 (2006)
Herrera, F., Verdegay, J.L.: Three models of fuzzy integer linear programmining. Eur. J. Oper. Res. 83, 581–593 (1995)
Bayardo, R. J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of ICDE'05, Washington, DC, USA, IEEE Computer Society, pp. 217–228, 2005
Gheisari, M., Najafabadi, H.E., Alzubi, J.A., Gao, J., Wang, G., Abbasi, A.A., Castiglione, A.: OBPP: an ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. 123, 1–13 (2021). https://doi.org/10.1016/j.future.2021.01.028
Alzubi, O.A., Alzubi, J.A., Shankar, K., Gupta, D.: Blockchain and artificial intelligence enabled privacy preserving medical data transmission in internet of things. Trans. Emerg. Telecommun. Technol. 32(2), 1–14 (2021)
Krivitski, D., Schuster, A., Wolff, R.: A local facility location algorithm for large-scale distributed systems. J. Grid Comput. 5(4), 361–378 (2007)
Xiao, Y., Xiong, L., Fan, L., Goryczka, S., Li, H.: DPCube: differentially private histogram release through multidimensional partitioning. Trans. Data Priv. 7(3), 195–222 (2014)
Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. Trans. Data Priv. 6(2), 161–183 (2014)
Song, J., Wang, W., Gadekallu, T.R., Cao, J., Liu, Y.: EPPDA: an efficient privacy-preserving data aggregation federated learning scheme. IEEE Trans. Netw. Sci. Eng. (2022). https://doi.org/10.1109/TNSE.2022.3153519
Wenjie, D., Yang, W., Zhou, J., Shi, L., Chen, G.: Privacy preserving via secure summation in distributed Kalman filtering. IEEE Trans. Control Netw. Syst. (2022). https://doi.org/10.1109/TCNS.2022.3155109
Bhuyan, H.K., Kamila, N.K., Pani, S.K.: Individual privacy in data mining using fuzzy optimization. Eng. Optim. (2021). https://doi.org/10.1080/0305215X.2021.1922897
Perez, I.J., Alonso, S., Cabrerizo, F.J., Lu, J., Herrera-Viedma, E.: Modelling Heterogeneity among Experts in Multi-criteria Group Decision Making Problems, pp. 55–66. Springer-Verlag, Berlin (2011)
Dutta, D., Murthy, S.: Multi-choice goal programming approach for a fuzzy transportation problem. IJRRAS 2(2), 132 (2010)
Jimenez, F., Cadenas, J.M., Sanchez, G., Gomez-Skarmeta, A.F., Verdegay, J.L.: Multiobjective evolutionary computation and fuzzy optimization. Int. J. Approx. Reason. 43, 59–75 (2006)
Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)
Deb, K.: Multiobjective Optimization Using Evolutionary Algorithms. Wiley, Hoboken (2001)
Tanaka, H., Okuda, T., Asai, K.: On fuzzy mathematical programming. J. Cybern. 3(4), 37–46 (1974)
Mukherjee, S., Chen, Z., Gangopadhyay, A.: A fuzzy programming approach for data reduction and privacy in distance based mining. Int. J. Inf. Comput. Secur. 2(1), 27–47 (2008)
Asuncion, A., Newman, D.: UCI machine learning repository, 2007.
Bhuyan, H.K., Kamila, N.K.: Privacy preserving sub-feature selection based on fuzzy probabilities. Clust. Comput. 17(4), 1383–1399 (2014)
Bhuyan, H.K., Mohanty, M., Das, S.R.: Privacy preserving for feature selection in data mining using centralized network. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 434–440 (2012)
Teo, S.G., Cao, J., Lee, V.C.S.: DAG: a general model for privacy-preserving data mining. IEEE Trans. Knowl. Data Eng. 32(1), 40–53 (2020)
Kim, S., Shin, H., Baek, C., Kim, S., Shin, J.: Learning New Words from Keystroke Data with Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 32(3), 479–491 (2020)
Christen, P., Ranbaduge, T., Vatsalan, D., Schnell, R.: Precise and fast cryptanalysis for bloom filter based privacy-preserving record linkage. IEEE Trans. Knowl. Data Eng. 31(11), 2164–2177 (2019)
Bhuyan, H.K., Dash, S.K., Roy, S., Swain, D.K.: Privacy preservation with penalty in decentralized network using multiparty computation. Int. J. Adv. Comput. Technol. (IJACT) 4(1), 297–303 (2012)
Bhuyan, H.K., Kamila, N.K., Dash, S.K.: An approach for privacy preservation of distributed data in peer to-peer network using multiparty computation. Int. J. Comput. Sci. Issues (IJCSI) 3(8), 424–429 (2011)
Kamila, N.K., Jena, L.D., Bhuyan, H.K.: Pareto-based multiobjective optimization for classification in data mining. Clust. Comput. (Springer) 19, 1723–1745 (2016)
Bhuyan, H. K., Madhusudan Reddy, C. V.: Sub-feature selection for novel classification. In: IEEE Explore. April, 2018.
Bhuyan, H.K., Ravi, V.K.: Analysis of sub-feature for classification in data mining. IEEE Trans. Eng. Manage. (2021). https://doi.org/10.1109/TEM.2021.3098463
Bhuyan, H. K., Raghu Kumar, L., Reddy, K. R.: Optimization model for Sub-feature selection in data mining. In: IEEE Explore. (2020)
Alazab, M., Lakshmanna, K., Reddy, T., Pham, Q.V., Maddikunta, P.K.: Multi objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities. Sustain. Energy Technol. Assess. 43, 1–19 (2021)
Kumar, R., Kumar, P., Tripathi, R., Gupta, G.P., Gadekallu, T.R., Srivastava, G.: Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput. Netw. 187, 1–15 (2021)
Kumar, P., Kumar, R., Srivastava, G., Gupta, G.P., Tripathi, R., Gadekallu, T.R., Xiong, N.N.: PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 8(3), 2326–2341 (2021)
Funding
No funding.
Author information
Authors and Affiliations
Contributions
All authors have equal contribution.
Corresponding author
Ethics declarations
Conflict of interest
No conflict of interest.
Ethical approval
None.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bhuyan, H.K., Ravi, V. & Yadav, M.S. Multi-objective optimization-based privacy in data mining. Cluster Comput 25, 4275–4287 (2022). https://doi.org/10.1007/s10586-022-03667-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-022-03667-3