Skip to main content

A Machine Learning Approach in Data Perturbation for Privacy-Preserving Data Mining

  • Conference paper
  • First Online:
Smart Computing Techniques and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 224))

  • 583 Accesses

Abstract

Data mining is a process where we can extract relevant information or patterns from the collection of data. In this era of big data, every organization aims to handle huge amounts of data and perform data mining techniques in order to extract pieces of information or patterns for various work and decision making. To protect privileged data and leakage of private information, the clients use different privacy-preserving techniques such as perturbation that protects client's data from revealing private information. The job of perturbing data on the client side is a herculean task, and it gets more difficult with the increase in the size of data. In this paper, we proposed a machine learning regression model that has been trained in such a way that it predicts the perturb data from original data and it even contains a comparative study of different regression models and their accuracy in perturbing the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shah, A., Gulati R.: Privacy-preserving data mining: techniques, classification and implication—A survey. Int. J. Comput. Appl. 137(12) (2016)

    Google Scholar 

  2. Pinkas B.: Cryptographic techniques for privacy-preserving data mining ACM SIGKDD Explor. 4(2), 12–19 (2002)

    Google Scholar 

  3. Shah, A., Gulati, R.: A survey on cryptographic techniques for privacy-preserving data mining. Int. J. Data Wareh. Mining 2(1), 8–12 (2012)

    Google Scholar 

  4. Ding Y., Klein K.: Model-Driven application-level encryption for the privacy of e-health data. In: International Conference on Availability, Reliability and Security(2010)

    Google Scholar 

  5. Dansana, J., Kumar, R., Dey, D.: Modified Ck secure sum algorithm in horizontally partitioned databases. In: International Conference on Research and Development Prospects on Engineering Technology, ICRDPET-2013, vol. 5

    Google Scholar 

  6. Teo, S.G., Shuguo Han, V.L,: A study of efficiency and accuracy of secure multiparty protocol in privacy-preserving data mining. In: 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 85–90 (2012)

    Google Scholar 

  7. Zhan, J., Matwin, S., Chang, L.W.: Privacy-preserving collaborative association rule mining, J. Netw. Comput. Appl. 30(3), 1216–1227 (2007)

    Google Scholar 

  8. Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy-preserving properties of random data perturbation techniques. In ICDM, pp. 99–106. IEEE Computer Society (2003)

    Google Scholar 

  9. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: The Proceedings of the ACM SIGMOD Conference, pp. 429–450 (2000)

    Google Scholar 

  10. Muralidhar, K., Sarathy, R.: A general additive data perturbation method for database security. J. Manage. Sci. 45(10), 1399–1415 (2002)

    Google Scholar 

  11. Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy-preserving data mining algorithms. In: ACM PODS Conference, pp. 247–255 (2002)

    Google Scholar 

  12. Kadampur, M.A., Somayajulu, D.V.L.N.: A noise addition scheme in decision tree for privacy-preserving data mining. J. Comput. 2(1), 137–144 (2010)

    Google Scholar 

  13. Li, Y., Zhu, S., Wang, L., Jajodia, S.: A privacy-enhanced micro aggregation method. In: Proceedings of 2nd International Symposium on Foundations of Information and Knowledge Systems, pp. 148–159 (2002)

    Google Scholar 

  14. Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of SIGKDD'02, Edmonton, Alberta, Canada (2002)

    Google Scholar 

  15. Fienberg, S.E., McIntyre, J.: Data swapping: variations on a theme by Dalenius and Reiss. J. Off. Stat. 2, 309–323 (2005)

    Google Scholar 

  16. Muralidhar, K., Sarathy, R.: Data shuffling—A new masking approach for numerical data. Manage. Sci. Forthcoming 529, 658–670 (2006)

    Google Scholar 

  17. Hintoglu, A.A., Saygin, Y.: Suppressing microdata to prevent probabilistic classification based inference. In: Proceedings of Secure Data Management, 2nd VLDB Workshop, pp. 155–169 (2005)

    Google Scholar 

  18. Rizvi, S., Harista, J.R.: Maintaining data privacy in association rule mining. In: Proceedings of 28th VLDB Conference, Honk Kong China, pp. 682–693 (2002)

    Google Scholar 

  19. Mukherjee, S., Chen, S., Gangopadhyay, A.: A privacy-preserving technique for euclidean distance-based mining algorithms using fourier-related transforms. VLDB J. 293–315 (2006)

    Google Scholar 

  20. Xu, S., Lai, S.: Fast Fourier transform based data perturbation method for privacy protection. In: Proceedings of the IEEE Conference on Intelligence and Security Informatics, pp. 222–225. New Brunswick, New Jersey (2007)

    Google Scholar 

  21. Malik, M.B., Ghazi, M.A., Ali, R.: Privacy-preserving data mining techniques: current scenario and future prospect. In: Third International Conference on Computer and Communication Technology, pp. 26–32 (2012)

    Google Scholar 

  22. Rashid, A.H. Hegazy, A.: Protect privacy of medical informatics using K-anonymization model. In: The 7th International Conference on Informatics and Systems (INFOS), pp. 1–10. Cairo (2010)

    Google Scholar 

  23. Rizvi, S., Harista, J.: Maintaining data privacy in association rule mining. In: Proceedings of 28th VLDB Conference, pp. 82–693. Honk Kong, China (2002)

    Google Scholar 

  24. Dansana, J., Kumar, R., Rautaray, J.: Techniques for privacy preserving association rule mining in distributed database. IRACST Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS) 2(6) (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jayanti Dansana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dansana, J., Singh, A. (2021). A Machine Learning Approach in Data Perturbation for Privacy-Preserving Data Mining. In: Satapathy, S.C., Bhateja, V., Favorskaya, M.N., Adilakshmi, T. (eds) Smart Computing Techniques and Applications. Smart Innovation, Systems and Technologies, vol 224. Springer, Singapore. https://doi.org/10.1007/978-981-16-1502-3_64

Download citation

Publish with us

Policies and ethics