Skip to main content
Log in

Multi-objective optimization-based privacy in data mining

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

This paper addresses the data privacy based on interactive computation using an optimization model in data mining. When data are computed or sharing among users in online, it needs to maintain privacy for all computation during sharing of data. But user choice-based privacy is not available when sharing of data is required for data mining computation which is a big challenge for data privacy. Thus, we proposed the framework for anonymity of data privacy using various methods of multi-objective models as per the requirement of privacy. The proposed framework is designed with the help of two objects such as computational cost and privacy based on optimization model. Our framework maintains the balance between above objects as per user demands, i.e., increasing the privacy with decreasing the computational cost. In this model, the domain of privacy and computational cost for optimization problem solves the entity privacy requirements in a computing environment. We have used various methods such as Gaussian and uniform distribution, confidence interval, activation function, linear membership function with distinguish manner for maintaining of privacy and cost. As per the uniform distribution and parameter α-cut value for noise data, the optimal value is made accordingly. Example: for α = 0.2, and uniform distribution (− 1, 1), the optimal value is 0.0058. Similarly, as per different α values, classifiers result is different like α = 0.2 and 0.4, Multilayer perceptron values are 4.01 and 1.61 respectively. The solution of the proposed model controls the amount of privacy with complete freedom of choice of users with utmost flexibility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Data will be made available on reasonable request.

References

  1. Alzubi, O.A., Alzubi, J.A., Al-Zoubi, A.M., Hassonah, M.A., Kose, U.: An efficient malware detection approach with feature weighting based on Harris Hawks optimization. Clust. Comput. J. (2021). https://doi.org/10.1007/s10586-021-03459-1

    Article  Google Scholar 

  2. Movassagh, A.A., Alzubi, J.A., Gheisari, M., Rahimi, M., Mohan, S., Abbasi, A.A., Nabipour, N.: Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model. J. Ambient Intell. Humniz. Comput. (2021). https://doi.org/10.1007/s12652-020-02623-6

    Article  Google Scholar 

  3. Gheisari, M., Alzubi, J., Zhang, X., Kose, U., Saucedo, J.A.M.: A new algorithm for optimization of quality of service in peer to peer wireless mesh networks. Wirel. Netw. 26, 4965–4973 (2020). https://doi.org/10.1007/s11276-019-01982-z

    Article  Google Scholar 

  4. Cadenas, J.M., Verdegy, J.L.: A primer on fuzzy optimization models and methods. Iran. J. Fuzzy Syst. 3(1), 1–21 (2006)

    MathSciNet  Google Scholar 

  5. Herrera, F., Verdegay, J.L.: Three models of fuzzy integer linear programmining. Eur. J. Oper. Res. 83, 581–593 (1995)

    Article  MATH  Google Scholar 

  6. Bayardo, R. J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of ICDE'05, Washington, DC, USA, IEEE Computer Society, pp. 217–228, 2005

  7. Gheisari, M., Najafabadi, H.E., Alzubi, J.A., Gao, J., Wang, G., Abbasi, A.A., Castiglione, A.: OBPP: an ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. 123, 1–13 (2021). https://doi.org/10.1016/j.future.2021.01.028

    Article  Google Scholar 

  8. Alzubi, O.A., Alzubi, J.A., Shankar, K., Gupta, D.: Blockchain and artificial intelligence enabled privacy preserving medical data transmission in internet of things. Trans. Emerg. Telecommun. Technol. 32(2), 1–14 (2021)

    Google Scholar 

  9. Krivitski, D., Schuster, A., Wolff, R.: A local facility location algorithm for large-scale distributed systems. J. Grid Comput. 5(4), 361–378 (2007)

    Article  Google Scholar 

  10. Xiao, Y., Xiong, L., Fan, L., Goryczka, S., Li, H.: DPCube: differentially private histogram release through multidimensional partitioning. Trans. Data Priv. 7(3), 195–222 (2014)

    MathSciNet  Google Scholar 

  11. Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. Trans. Data Priv. 6(2), 161–183 (2014)

    MathSciNet  Google Scholar 

  12. Song, J., Wang, W., Gadekallu, T.R., Cao, J., Liu, Y.: EPPDA: an efficient privacy-preserving data aggregation federated learning scheme. IEEE Trans. Netw. Sci. Eng. (2022). https://doi.org/10.1109/TNSE.2022.3153519

    Article  Google Scholar 

  13. Wenjie, D., Yang, W., Zhou, J., Shi, L., Chen, G.: Privacy preserving via secure summation in distributed Kalman filtering. IEEE Trans. Control Netw. Syst. (2022). https://doi.org/10.1109/TCNS.2022.3155109

    Article  Google Scholar 

  14. Bhuyan, H.K., Kamila, N.K., Pani, S.K.: Individual privacy in data mining using fuzzy optimization. Eng. Optim. (2021). https://doi.org/10.1080/0305215X.2021.1922897

    Article  Google Scholar 

  15. Perez, I.J., Alonso, S., Cabrerizo, F.J., Lu, J., Herrera-Viedma, E.: Modelling Heterogeneity among Experts in Multi-criteria Group Decision Making Problems, pp. 55–66. Springer-Verlag, Berlin (2011)

    Google Scholar 

  16. Dutta, D., Murthy, S.: Multi-choice goal programming approach for a fuzzy transportation problem. IJRRAS 2(2), 132 (2010)

    MATH  Google Scholar 

  17. Jimenez, F., Cadenas, J.M., Sanchez, G., Gomez-Skarmeta, A.F., Verdegay, J.L.: Multiobjective evolutionary computation and fuzzy optimization. Int. J. Approx. Reason. 43, 59–75 (2006)

    Article  MATH  Google Scholar 

  18. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)

    Book  MATH  Google Scholar 

  19. Deb, K.: Multiobjective Optimization Using Evolutionary Algorithms. Wiley, Hoboken (2001)

    MATH  Google Scholar 

  20. Tanaka, H., Okuda, T., Asai, K.: On fuzzy mathematical programming. J. Cybern. 3(4), 37–46 (1974)

    Article  MathSciNet  MATH  Google Scholar 

  21. Mukherjee, S., Chen, Z., Gangopadhyay, A.: A fuzzy programming approach for data reduction and privacy in distance based mining. Int. J. Inf. Comput. Secur. 2(1), 27–47 (2008)

    Google Scholar 

  22. Asuncion, A., Newman, D.: UCI machine learning repository, 2007.

  23. Bhuyan, H.K., Kamila, N.K.: Privacy preserving sub-feature selection based on fuzzy probabilities. Clust. Comput. 17(4), 1383–1399 (2014)

    Article  Google Scholar 

  24. Bhuyan, H.K., Mohanty, M., Das, S.R.: Privacy preserving for feature selection in data mining using centralized network. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 434–440 (2012)

    Google Scholar 

  25. Teo, S.G., Cao, J., Lee, V.C.S.: DAG: a general model for privacy-preserving data mining. IEEE Trans. Knowl. Data Eng. 32(1), 40–53 (2020)

    Article  Google Scholar 

  26. Kim, S., Shin, H., Baek, C., Kim, S., Shin, J.: Learning New Words from Keystroke Data with Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 32(3), 479–491 (2020)

    Article  Google Scholar 

  27. Christen, P., Ranbaduge, T., Vatsalan, D., Schnell, R.: Precise and fast cryptanalysis for bloom filter based privacy-preserving record linkage. IEEE Trans. Knowl. Data Eng. 31(11), 2164–2177 (2019)

    Article  Google Scholar 

  28. Bhuyan, H.K., Dash, S.K., Roy, S., Swain, D.K.: Privacy preservation with penalty in decentralized network using multiparty computation. Int. J. Adv. Comput. Technol. (IJACT) 4(1), 297–303 (2012)

    Google Scholar 

  29. Bhuyan, H.K., Kamila, N.K., Dash, S.K.: An approach for privacy preservation of distributed data in peer to-peer network using multiparty computation. Int. J. Comput. Sci. Issues (IJCSI) 3(8), 424–429 (2011)

    Google Scholar 

  30. Kamila, N.K., Jena, L.D., Bhuyan, H.K.: Pareto-based multiobjective optimization for classification in data mining. Clust. Comput. (Springer) 19, 1723–1745 (2016)

    Article  Google Scholar 

  31. Bhuyan, H. K., Madhusudan Reddy, C. V.: Sub-feature selection for novel classification. In: IEEE Explore. April, 2018.

  32. Bhuyan, H.K., Ravi, V.K.: Analysis of sub-feature for classification in data mining. IEEE Trans. Eng. Manage. (2021). https://doi.org/10.1109/TEM.2021.3098463

    Article  Google Scholar 

  33. Bhuyan, H. K., Raghu Kumar, L., Reddy, K. R.: Optimization model for Sub-feature selection in data mining. In: IEEE Explore. (2020)

  34. Alazab, M., Lakshmanna, K., Reddy, T., Pham, Q.V., Maddikunta, P.K.: Multi objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities. Sustain. Energy Technol. Assess. 43, 1–19 (2021)

    Google Scholar 

  35. Kumar, R., Kumar, P., Tripathi, R., Gupta, G.P., Gadekallu, T.R., Srivastava, G.: Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput. Netw. 187, 1–15 (2021)

    Article  Google Scholar 

  36. Kumar, P., Kumar, R., Srivastava, G., Gupta, G.P., Tripathi, R., Gadekallu, T.R., Xiong, N.N.: PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 8(3), 2326–2341 (2021)

    Article  Google Scholar 

Download references

Funding

No funding.

Author information

Authors and Affiliations

Authors

Contributions

All authors have equal contribution.

Corresponding author

Correspondence to Vinayakumar Ravi.

Ethics declarations

Conflict of interest

No conflict of interest.

Ethical approval

None.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhuyan, H.K., Ravi, V. & Yadav, M.S. Multi-objective optimization-based privacy in data mining. Cluster Comput 25, 4275–4287 (2022). https://doi.org/10.1007/s10586-022-03667-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03667-3

Keywords

Navigation