Remodeling: improved privacy preserving data mining (PPDM)

被引:2
|
作者
Shastri M.D. [1 ]
Pandit A.A. [1 ]
机构
[1] Department of Master in Computer Applications, Veermata Jijabai Technological Institute Mumbai, Mumbai
关键词
Anonymization; Clustering; Data mining; Encryption; Privacy preserving; Remodeling;
D O I
10.1007/s41870-020-00531-8
中图分类号
学科分类号
摘要
The data provided by individuals and various organizations while using internet applications and mobile devices are very useful to generate solutions and create new opportunities. The data which is shared needs to be precise to get the quality results. The data which may contain an individual’s sensitive information cannot be revealed to the world without applying some privacy preserving technique on it. Privacy preserving data mining (PPDM) and Privacy preserving data publishing (PPDP) are some of the techniques which can be utilized to preserve privacy. There are some positives and negatives for every technique. The cons frequently constitute loss of data, reduction in the utility of data, compromised diversity of data, reduced security, etc. In this paper, the authors propose a new technique called Remodeling, which works in conjunction with the k-anonymity and K-means algorithm to ensure minimum data loss, better privacy preservation while maintaining the diversity of data. Network data security is also handled by this proposed model. In this research paper, theoretically, we have shown that the proposed technique addresses all the above-mentioned cons and also discusses the merits and demerits of the same. © 2020, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:131 / 137
页数:6
相关论文
共 50 条
  • [1] Data privacy in construction industry by privacy-preserving data mining (PPDM) approach
    Patel T.
    Patel V.
    [J]. Asian Journal of Civil Engineering, 2020, 21 (3) : 505 - 515
  • [2] An Improved Method for Privacy Preserving Data Mining
    Poovammal, E.
    Ponnavaikko, M.
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1453 - +
  • [3] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [4] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206
  • [5] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [6] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [7] An improved algorithm for privacy-preserving data mining based on NMF
    Li, Guang
    Xi, Meng
    [J]. Journal of Information and Computational Science, 2015, 12 (09): : 3423 - 3430
  • [8] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [9] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [10] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450