Skip to main content

Privacy-Preserving Data Mining in Web Domain Using Protected Data Extraction and Presentation Algorithm

  • Conference paper
  • First Online:
Recent Trends in Communication and Intelligent Systems

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 191 Accesses

Abstract

Various privacy security standards are used in practical applications to decide research issues. The general strategies of privacy preservation are used to process the data security pledge at a lower privacy level. Furthermore, probability and mathematical models are introduced in order to maintain privacy. Privacy-preserving data mining models are used to preserve the privacy of different high-level data characteristics. The main objective of protecting privacy that is based on data release is to obtain a common approach of protecting privacy in different kinds of applications so that the designed algorithm could be implemented in a versatile way. This paper presents protected data extraction and presentation algorithm (PDEPA) that is used for data extraction and presentation with minimized error in classification and computation time, as well as increased privacy. The framework's development is aimed at ensuring that the running environment and applications are privacy compatible. The web-based distributed application's data extraction time and classification error are reduced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. P. Manickam, G. Singaravel, An approach for prevention of privacy breach and information leakage in sensitive data mining. Comput. Electric. Eng. 45 (2015). https://doi.org/10.1016/j.compeleceng.2015.01.016

  2. J. Neville, D. Jensen, Collective classification with relational dependency networks, in Proceedings of the 2nd Multi-Relational Data Mining Workshop, KDD2003 (2003), pp. 77–91

    Google Scholar 

  3. C. Aggarwal, T. Abdelzaher, Integrating sensors and social networks, in Social Network Data Analytics. ed. by C.C. Aggarwal (Springer, New York, 2011), pp. 379–412

    Chapter  Google Scholar 

  4. M. Calnan, The Sociology of Health and Illness, 3rd edn by S. Nettleton, (Polity Press, Cambridge, 2013), £60, 292, The Sociological Review 61. https://doi.org/10.1111/1467-954X.12090

  5. J. Srivastava, Data mining for social network analysis, in 2008 IEEE International Conference on Intelligence and Security Informatics (2008), pp. xxxiii–xxxiv. https://doi.org/10.1109/ISI.2008.4565015

  6. Z. Feng, Y. Zhu, A survey on trajectory data mining: techniques and applications. IEEE Access 4, 1–1 (2016). https://doi.org/10.1109/ACCESS.2016.2553681

    Article  Google Scholar 

  7. K.K. Kapoor, K. Tamilmani, N.P. Rana et al., Advances in social media research: Past, present and future. Inf. Syst. Front 20, 531–558 (2018). https://doi.org/10.1007/s10796-017-9810-y

    Article  Google Scholar 

  8. S. Devi, R. Indhumathi, A Study on Privacy-Preserving Approaches in Online Social Network for Data Publishing: Proceedings of ICDMAI 2018, vol. 1 (2019). https://doi.org/10.1007/978-981-13-1402-5_8

  9. W.A.K. Salman, S.B. Sadkhan,Proposed approach to sensitive association rules protection based on compressing and cryptography: (SARP-CC), in 2020 1st. Information Technology To Enhance e-learning and Other Application (IT-ELA, Baghdad, Iraq, 2020), pp. 19–24

    Google Scholar 

  10. R. Nieminen, K. Jrvinen, Practical privacy-preserving indoor localization based on secure two-party computation. IEEE Trans. Mob. Comput. https://doi.org/10.1109/TMC.2020.2990871

  11. S. Kumar, S. Kandasamy, K. Deepa, On privacy and security in social media—A comprehensive study. Procedia Comput. Sci. 78, 114–119 (2016). https://doi.org/10.1016/j.procs.2016.02.019

  12. D. Paschalides, A. Kornilakis, C. Christodoulou, R. Andreou, G. Pallis, E. Markatos, Check-It: a plugin for detecting and reducing the spread of fake news and misinformation on the web, in WI ‘19: IEEE/WIC/ACM International Conference on Web Intelligence (2019), pp. 298–302. https://doi.org/10.1145/3350546.3352534

  13. U. Yun, D. Kim, Analysis of privacy preserving approaches in high utility pattern mining (2017). https://doi.org/10.1007/978-981-10-3023-9_137

  14. S. Zhang, X. Li, H. Liu, Y. Lin, A. Sangaiah, A privacy-preserving friend recommendation scheme in online social networks. Sustain. Cities Soc. 38 (2018). https://doi.org/10.1016/j.scs.2017.12.031

  15. R. Chakraborty, C. Vishik, R. Rao, Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing. Decis. Support. Syst. 55 (2013). https://doi.org/10.1016/j.dss.2013.01.004

  16. G. Li, Y. Wang, A privacy-preserving classification method based on singular value decomposition. Int. Arab J. Inf. Technol. 9 (2012). https://doi.org/10.3969/j.issn.0372-2112.2012.04.019

  17. R.C. Wong, J. Li, A.W. Fu, K. Wang, (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. KDD ’06 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vibhor Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, V., Bhushan, S., Singh, A.K., Kumar, P. (2022). Privacy-Preserving Data Mining in Web Domain Using Protected Data Extraction and Presentation Algorithm. In: Pundir, A.K.S., Yadav, N., Sharma, H., Das, S. (eds) Recent Trends in Communication and Intelligent Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1324-2_32

Download citation

Publish with us

Policies and ethics