An Intelligent Model for Privacy Preserving Data Mining: Study on Health Care Data

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 385)


Critical challenge in developing a privacy protection mechanism is to preserve maximum information because protection mechanisms normally impact on the quality of data and which are served not accordingly with the data utility. Practical solutions to address various socio-economic needs with special emphasize on the utility of data have not been devised yet. To publish maximum information while protecting the privacy, we propose an intelligent mechanism and this paper includes a comprehensive study and explores how effectively the privacy of individuals can be protected with minimum information loss. Empirical evaluations on original health care data related to Indian Population show the effectiveness of the new approach, namely Adaptive Utility-based Anonymization (AUA).


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Panackal, J.J., Pillai, A.S., Krishnachandran, V. N.: Disclosure risk of individuals: a \(k\)-anonymity study on health care data related to indian population. In: IEEE International Conference on Data Science and Engineering, pp. 221–226 (2014)Google Scholar
  2. 2.
    Panackal, J.J., Pillai, A.S.: Adaptive utility-based anonymization model for privacy preserving data mining. In: International Conference on Data Mining and Warehousing(ICDMW), Data Mining Algorithms, pp. 220–228. Elsevier (2014)Google Scholar
  3. 3.
    Panackal, J.J., Pillai, A.S.: An intelligent framework for protecting privacy of individuals: empirical evaluations on data mining classification. In: International Conference on Hybrid Intelligent Systems (HIS). IEEE (2014)Google Scholar
  4. 4.
    Malik, M.B., Ghazi, M.A., Ali, R.: Privacy preserving data mining techniques: current scenario and future prospects. In: Third International Conference on Computer and Communication Technology. IEEE (2012)Google Scholar
  5. 5.
    Sharma, M., Chaudhary, A., et al.: A review study on the Privacy Preserving Data Mining Techniques and Approaches. International Journal of Computer Science and Telecommunications 4(9) (2013)Google Scholar
  6. 6.
    Liu, L., Kantarcioglu, M., Thuraisingham, B.: The applicability of the perturbation based privacy preserving data mining for real-world data. Data and Knowledge Engineering (2008)Google Scholar
  7. 7.
    Samarati, P.: Protecting respondents privacy in Microdata release. IEEE Transactions on Knowledge and Data Engineering, pp 1010–1027 (2002)Google Scholar
  8. 8.
    Li, T., Li, N.: Towards Optimal k-anonymization. Data and Knowledge Engineering (2008)Google Scholar
  9. 9.
    Mukkamala, R., Ashok, V.G.: Fuzzy-based methods for privacy-preserving data mining. In: Eighth International Conference on Information Technology: New Generations (2011)Google Scholar
  10. 10.
    Zhu, Y., Peng, L.: Study on k-anonymity models of sharing medical information. IEEE (2007)Google Scholar
  11. 11.
    Liu, J., Luo, J., Huang, J.Z.: Rating: privacy preservation for multiple attributes with different sensitivity requirements. In: 11th IEEE International Conference on Data Mining Workshops (2011)Google Scholar
  12. 12.
    Fernández-Alemn, J.L., Señor, I.C., Lozoya, P.Á.O., Toval, A.: Methodological Review-Security and Privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics (2013)Google Scholar
  13. 13.
    Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 571–588 (2002)Google Scholar
  14. 14.
    Zhu, D., Li, X.-B., Wu, S.: Identity disclosure protection: A data reconstruction approach for privacy preserving data mining. Decision Support Systems, 133–140 (2009) (Elsevier)Google Scholar
  15. 15.
    Yang, W., Qiao, S.: A novel anonymization algorithm: Privacy Protection and Knowledge Preservation. Expert Systems with Applications, 756–766 (2010) (Elsevier)Google Scholar
  16. 16.
    Sun, X., Sun, L., Wang, H.: Extended k-anonymity models against sensitive attribute disclosure. Computer Communications, 526–535 (2011) (Elsevier)Google Scholar
  17. 17.
    Taneja, S., Khanna, S., et al.: A Review on Privacy Preserving Data Mining: Techniques and Research Challenges. International Journal of Computer Science and Information Technologies 5(2), 2310–2315 (2014)Google Scholar
  18. 18.
    Borhade, S.S., Shinde, B.B.: Privacy Preserving Data Mining Using Association Rule With Condensation Approach. International Journal of Emerging Technology and Advanced Engineering 4(3), 292–296 (2014)Google Scholar
  19. 19.
    Panackal, J.J., Pillai, A.S.: Privacy preserving data mining: an extensive survey. In: ACEEE International Conference on Multimedia Processing, Communication and Information Technology (2013)Google Scholar
  20. 20.
    Han, J., Kamber, M.: Data Mining Concepts and Techniques, 2nd (edn). ElsevierGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Vidya Academy of Science and TechnologyThrissurIndia
  2. 2.Hindustan UniversityChennaiIndia

Personalised recommendations