Abstract
Data mining is a process where we can extract relevant information or patterns from the collection of data. In this era of big data, every organization aims to handle huge amounts of data and perform data mining techniques in order to extract pieces of information or patterns for various work and decision making. To protect privileged data and leakage of private information, the clients use different privacy-preserving techniques such as perturbation that protects client's data from revealing private information. The job of perturbing data on the client side is a herculean task, and it gets more difficult with the increase in the size of data. In this paper, we proposed a machine learning regression model that has been trained in such a way that it predicts the perturb data from original data and it even contains a comparative study of different regression models and their accuracy in perturbing the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shah, A., Gulati R.: Privacy-preserving data mining: techniques, classification and implication—A survey. Int. J. Comput. Appl. 137(12) (2016)
Pinkas B.: Cryptographic techniques for privacy-preserving data mining ACM SIGKDD Explor. 4(2), 12–19 (2002)
Shah, A., Gulati, R.: A survey on cryptographic techniques for privacy-preserving data mining. Int. J. Data Wareh. Mining 2(1), 8–12 (2012)
Ding Y., Klein K.: Model-Driven application-level encryption for the privacy of e-health data. In: International Conference on Availability, Reliability and Security(2010)
Dansana, J., Kumar, R., Dey, D.: Modified Ck secure sum algorithm in horizontally partitioned databases. In: International Conference on Research and Development Prospects on Engineering Technology, ICRDPET-2013, vol. 5
Teo, S.G., Shuguo Han, V.L,: A study of efficiency and accuracy of secure multiparty protocol in privacy-preserving data mining. In: 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 85–90 (2012)
Zhan, J., Matwin, S., Chang, L.W.: Privacy-preserving collaborative association rule mining, J. Netw. Comput. Appl. 30(3), 1216–1227 (2007)
Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy-preserving properties of random data perturbation techniques. In ICDM, pp. 99–106. IEEE Computer Society (2003)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: The Proceedings of the ACM SIGMOD Conference, pp. 429–450 (2000)
Muralidhar, K., Sarathy, R.: A general additive data perturbation method for database security. J. Manage. Sci. 45(10), 1399–1415 (2002)
Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy-preserving data mining algorithms. In: ACM PODS Conference, pp. 247–255 (2002)
Kadampur, M.A., Somayajulu, D.V.L.N.: A noise addition scheme in decision tree for privacy-preserving data mining. J. Comput. 2(1), 137–144 (2010)
Li, Y., Zhu, S., Wang, L., Jajodia, S.: A privacy-enhanced micro aggregation method. In: Proceedings of 2nd International Symposium on Foundations of Information and Knowledge Systems, pp. 148–159 (2002)
Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of SIGKDD'02, Edmonton, Alberta, Canada (2002)
Fienberg, S.E., McIntyre, J.: Data swapping: variations on a theme by Dalenius and Reiss. J. Off. Stat. 2, 309–323 (2005)
Muralidhar, K., Sarathy, R.: Data shuffling—A new masking approach for numerical data. Manage. Sci. Forthcoming 529, 658–670 (2006)
Hintoglu, A.A., Saygin, Y.: Suppressing microdata to prevent probabilistic classification based inference. In: Proceedings of Secure Data Management, 2nd VLDB Workshop, pp. 155–169 (2005)
Rizvi, S., Harista, J.R.: Maintaining data privacy in association rule mining. In: Proceedings of 28th VLDB Conference, Honk Kong China, pp. 682–693 (2002)
Mukherjee, S., Chen, S., Gangopadhyay, A.: A privacy-preserving technique for euclidean distance-based mining algorithms using fourier-related transforms. VLDB J. 293–315 (2006)
Xu, S., Lai, S.: Fast Fourier transform based data perturbation method for privacy protection. In: Proceedings of the IEEE Conference on Intelligence and Security Informatics, pp. 222–225. New Brunswick, New Jersey (2007)
Malik, M.B., Ghazi, M.A., Ali, R.: Privacy-preserving data mining techniques: current scenario and future prospect. In: Third International Conference on Computer and Communication Technology, pp. 26–32 (2012)
Rashid, A.H. Hegazy, A.: Protect privacy of medical informatics using K-anonymization model. In: The 7th International Conference on Informatics and Systems (INFOS), pp. 1–10. Cairo (2010)
Rizvi, S., Harista, J.: Maintaining data privacy in association rule mining. In: Proceedings of 28th VLDB Conference, pp. 82–693. Honk Kong, China (2002)
Dansana, J., Kumar, R., Rautaray, J.: Techniques for privacy preserving association rule mining in distributed database. IRACST Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS) 2(6) (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dansana, J., Singh, A. (2021). A Machine Learning Approach in Data Perturbation for Privacy-Preserving Data Mining. In: Satapathy, S.C., Bhateja, V., Favorskaya, M.N., Adilakshmi, T. (eds) Smart Computing Techniques and Applications. Smart Innovation, Systems and Technologies, vol 224. Springer, Singapore. https://doi.org/10.1007/978-981-16-1502-3_64
Download citation
DOI: https://doi.org/10.1007/978-981-16-1502-3_64
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1501-6
Online ISBN: 978-981-16-1502-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)