Abstract
Various privacy security standards are used in practical applications to decide research issues. The general strategies of privacy preservation are used to process the data security pledge at a lower privacy level. Furthermore, probability and mathematical models are introduced in order to maintain privacy. Privacy-preserving data mining models are used to preserve the privacy of different high-level data characteristics. The main objective of protecting privacy that is based on data release is to obtain a common approach of protecting privacy in different kinds of applications so that the designed algorithm could be implemented in a versatile way. This paper presents protected data extraction and presentation algorithm (PDEPA) that is used for data extraction and presentation with minimized error in classification and computation time, as well as increased privacy. The framework's development is aimed at ensuring that the running environment and applications are privacy compatible. The web-based distributed application's data extraction time and classification error are reduced.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
P. Manickam, G. Singaravel, An approach for prevention of privacy breach and information leakage in sensitive data mining. Comput. Electric. Eng. 45 (2015). https://doi.org/10.1016/j.compeleceng.2015.01.016
J. Neville, D. Jensen, Collective classification with relational dependency networks, in Proceedings of the 2nd Multi-Relational Data Mining Workshop, KDD2003 (2003), pp. 77–91
C. Aggarwal, T. Abdelzaher, Integrating sensors and social networks, in Social Network Data Analytics. ed. by C.C. Aggarwal (Springer, New York, 2011), pp. 379–412
M. Calnan, The Sociology of Health and Illness, 3rd edn by S. Nettleton, (Polity Press, Cambridge, 2013), £60, 292, The Sociological Review 61. https://doi.org/10.1111/1467-954X.12090
J. Srivastava, Data mining for social network analysis, in 2008 IEEE International Conference on Intelligence and Security Informatics (2008), pp. xxxiii–xxxiv. https://doi.org/10.1109/ISI.2008.4565015
Z. Feng, Y. Zhu, A survey on trajectory data mining: techniques and applications. IEEE Access 4, 1–1 (2016). https://doi.org/10.1109/ACCESS.2016.2553681
K.K. Kapoor, K. Tamilmani, N.P. Rana et al., Advances in social media research: Past, present and future. Inf. Syst. Front 20, 531–558 (2018). https://doi.org/10.1007/s10796-017-9810-y
S. Devi, R. Indhumathi, A Study on Privacy-Preserving Approaches in Online Social Network for Data Publishing: Proceedings of ICDMAI 2018, vol. 1 (2019). https://doi.org/10.1007/978-981-13-1402-5_8
W.A.K. Salman, S.B. Sadkhan,Proposed approach to sensitive association rules protection based on compressing and cryptography: (SARP-CC), in 2020 1st. Information Technology To Enhance e-learning and Other Application (IT-ELA, Baghdad, Iraq, 2020), pp. 19–24
R. Nieminen, K. Jrvinen, Practical privacy-preserving indoor localization based on secure two-party computation. IEEE Trans. Mob. Comput. https://doi.org/10.1109/TMC.2020.2990871
S. Kumar, S. Kandasamy, K. Deepa, On privacy and security in social media—A comprehensive study. Procedia Comput. Sci. 78, 114–119 (2016). https://doi.org/10.1016/j.procs.2016.02.019
D. Paschalides, A. Kornilakis, C. Christodoulou, R. Andreou, G. Pallis, E. Markatos, Check-It: a plugin for detecting and reducing the spread of fake news and misinformation on the web, in WI ‘19: IEEE/WIC/ACM International Conference on Web Intelligence (2019), pp. 298–302. https://doi.org/10.1145/3350546.3352534
U. Yun, D. Kim, Analysis of privacy preserving approaches in high utility pattern mining (2017). https://doi.org/10.1007/978-981-10-3023-9_137
S. Zhang, X. Li, H. Liu, Y. Lin, A. Sangaiah, A privacy-preserving friend recommendation scheme in online social networks. Sustain. Cities Soc. 38 (2018). https://doi.org/10.1016/j.scs.2017.12.031
R. Chakraborty, C. Vishik, R. Rao, Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing. Decis. Support. Syst. 55 (2013). https://doi.org/10.1016/j.dss.2013.01.004
G. Li, Y. Wang, A privacy-preserving classification method based on singular value decomposition. Int. Arab J. Inf. Technol. 9 (2012). https://doi.org/10.3969/j.issn.0372-2112.2012.04.019
R.C. Wong, J. Li, A.W. Fu, K. Wang, (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. KDD ’06 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, V., Bhushan, S., Singh, A.K., Kumar, P. (2022). Privacy-Preserving Data Mining in Web Domain Using Protected Data Extraction and Presentation Algorithm. In: Pundir, A.K.S., Yadav, N., Sharma, H., Das, S. (eds) Recent Trends in Communication and Intelligent Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1324-2_32
Download citation
DOI: https://doi.org/10.1007/978-981-19-1324-2_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1323-5
Online ISBN: 978-981-19-1324-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)