A model for Privacy Preserving in Data Mining using Soft Computing Techniques

被引:0
|
作者
Malik, Majid Bashir [1 ]
Asger, M. [2 ]
Ali, Rashid [3 ]
Sarvar, Abid [4 ]
机构
[1] BGSB Univ, Dept Comp Sci, Rajouri, Jammu & Kashmir, India
[2] BGSB Univ, Sch Math Sci & Engn, Rajouri, Jammu & Kashmir, India
[3] Aligarh Muslim Univ, Dept Comp Engn, Aligarh, Uttar Pradesh, India
[4] Univ Jammu, Dept Comp Sci, Jammu 180004, Jammu & Kashmir, India
关键词
PPDM; Fuzzy; Neural Networks; Fuzzy membership function; MLP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining is branch of computer science that delivers valuable information hidden in large volumes of data. The success of data mining depends on the quality of data and the algorithms used to extract information. A large number of tools and techniques have been developed for the purpose. Soft Computing methods have also emerged as a powerful tool for data mining as soft computing is tolerant to uncertainty, partial truth and imprecision. It helps in achieving solutions that are low cost, robust and tractable. Neural Networks are being extensively used for analysis purposes in every field of life from business to health sectors. In the current scenario where privacy of an individual is an important issue, people are reluctant to share their confidential information. Thereby privacy preserving in data mining (PPDM) has emerged as an indistinguishable component of data mining. The aim of this paper is to propose a model that preserves the privacy of individuals without affecting the final results of the Neural Networks.
引用
收藏
页码:181 / 186
页数:6
相关论文
共 50 条
  • [41] A Survey on Privacy Preserving Data Mining
    Wang, Jian
    Luo, Yongcheng
    Zhao, Yan
    Le, Jianjin
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 111 - 114
  • [42] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311
  • [43] An Overview of Privacy Preserving Data Mining
    Qi, Xinjun
    Zong, Mingkui
    2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347
  • [44] A Survey on Privacy Preserving Mining Implementing Techniques
    Vishwakarma, Bhavna
    Gupta, Huma
    Manoria, Manish
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [45] A Review on Privacy Preserving Data Mining
    Shanthi, A. S.
    Karthikeyan, M.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 438 - 441
  • [46] A Survey on Privacy Preserving Data Mining
    Saranya, K.
    Premalatha, K.
    Rajasekar, S. S.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1740 - U2102
  • [47] Study of Privacy Preserving Data Mining
    Li, Haisheng
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 700 - 703
  • [48] Survey on privacy preserving data mining
    Wang P.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (09) : 1 - 7
  • [49] δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining
    Li, Zhizhou
    Lai, Ten H.
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 124 - 142
  • [50] Privacy Preserving Data Mining using Visual Steganography and Encryption
    Sah, Hare Ram
    Gunasekaran, G.
    10TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2015), 2015, : 154 - 158