A model for Privacy Preserving in Data Mining using Soft Computing Techniques

被引:0
|
作者
Malik, Majid Bashir [1 ]
Asger, M. [2 ]
Ali, Rashid [3 ]
Sarvar, Abid [4 ]
机构
[1] BGSB Univ, Dept Comp Sci, Rajouri, Jammu & Kashmir, India
[2] BGSB Univ, Sch Math Sci & Engn, Rajouri, Jammu & Kashmir, India
[3] Aligarh Muslim Univ, Dept Comp Engn, Aligarh, Uttar Pradesh, India
[4] Univ Jammu, Dept Comp Sci, Jammu 180004, Jammu & Kashmir, India
关键词
PPDM; Fuzzy; Neural Networks; Fuzzy membership function; MLP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining is branch of computer science that delivers valuable information hidden in large volumes of data. The success of data mining depends on the quality of data and the algorithms used to extract information. A large number of tools and techniques have been developed for the purpose. Soft Computing methods have also emerged as a powerful tool for data mining as soft computing is tolerant to uncertainty, partial truth and imprecision. It helps in achieving solutions that are low cost, robust and tractable. Neural Networks are being extensively used for analysis purposes in every field of life from business to health sectors. In the current scenario where privacy of an individual is an important issue, people are reluctant to share their confidential information. Thereby privacy preserving in data mining (PPDM) has emerged as an indistinguishable component of data mining. The aim of this paper is to propose a model that preserves the privacy of individuals without affecting the final results of the Neural Networks.
引用
收藏
页码:181 / 186
页数:6
相关论文
共 50 条
  • [1] Privacy Preserving Distributed Data Mining with Evolutionary Computing
    Jena, Lambodar
    Kamila, Narendra Ku.
    Mishra, Sushruta
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2013, 2014, 247 : 259 - 267
  • [2] Soft Computing Techniques in Data Mining
    Alcala-Fdez, Jesus
    Herrera, Francisco
    JOURNAL OF MULTIPLE-VALUED LOGIC AND SOFT COMPUTING, 2011, 17 (2-3) : 99 - 100
  • [3] Granular Computing in Privacy-Preserving Data Mining
    Zhan, Justin
    Lin, Tsau Young
    2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 86 - +
  • [4] A Comprehensive Assessment of Privacy Preserving Data Mining Techniques
    Prasanthi, Kundeti Naga
    Rao, M. V. P. Chandra Sekhara
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 833 - 842
  • [5] Privacy Preserving Data Mining Techniques-Survey
    Dhanalakshmi, M.
    Sankari, Siva E.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [6] A Survey on Privacy Preserving Data Mining Approaches and Techniques
    Siraj, Maheyzah Md
    Rahmat, Nurul Adibah
    Din, Mazura Mat
    2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, : 65 - 69
  • [7] A Hybrid Approach of Privacy Preserving Data Mining using Suppression and Perturbation Techniques
    Kaur, Arshveer
    2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 306 - 311
  • [8] Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment
    Hammami, Hamza
    Brahmi, Hanen
    Brahmi, Imen
    Ben Yahia, Sadok
    INFORMATION SYSTEMS, EMCIS 2017, 2017, 299 : 397 - 413
  • [9] Comparative Analysis of Privacy-Preserving Data Mining Techniques
    Bhandari, Neetika
    Pahwa, Payal
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 535 - 541
  • [10] Privacy Preserving Data Mining on Big Data Computing Platform: Trends and Future
    Gao Zhiqiang
    Zhang Longjun
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, INCOS-2017, 2018, 8 : 491 - 502