A Robust Privacy Preserving of Multiple and Binary Attribute by Using Super modularity with Perturbation

Authors

  • Priya Ranjan  Computer Science and Engineering, Vedica Institute of Technology, Bhopal, Madhya Pradesh, India
  • Raj Kumar Paul  Computer Science and Engineering, Vedica Institute of Technology, Bhopal, Madhya Pradesh, India

DOI:

https://doi.org//10.32628/CSEIT183838

Keywords:

Association Patterns , Decision Making , Aprior Algorithm , Data Mining , Perturbation Technique

Abstract

With the increase of digital data on servers different approach of data mining is applied for the retrieval of interesting information in decision making. A major social concern of data mining is the issue of privacy and data security. So privacy preserving mining come in existence, as it validates those data mining algorithms that do not disclose sensitive information. This work provides privacy for sensitive rules that discriminate data on the basis of community, gender, country, etc. Rules are obtained by aprior algorithm of association rule mining. Those rules which contain sensitive item set with minimum threshold value are considered as sensitive. Perturbation technique is used for the hiding of sensitive rules. The age of large database is now a big issue. So researchers try to develop a high performance platform to efficiently secure these kind of data before publishing. Here proposed work has resolve this issue of digital data security by finding the relation between the columns of the dataset which is based on the highly relative association patterns. Here use of super modularity is also done which balance the risk and utilization of the data. Experiment is done on large dataset which have all kind of attribute for implementing proposed work features. The experiments showed that the proposed algorithms perform well on large databases. It work better as the Maximum lost pattern percentage is zero a certain value of support.

References

  1. Data Mining From Wikipedia, The free Encyclopaedia.
  2. Jiawei Han, Micheline Kamber, Jian Pei "Data Mining Concepts and Techniques," Intelligent Database Systems Research Lab, School of Computing Science, Simon University, Canada.
  3. Jaydip Sen "Privacy Preserving Data Mining Applications Challenges and Future Trends," Presentation to Innovation Lab, Tata Consultancy Services, Kolkata, 2nd ICCCT, MNNIT, Allahabad Sept 2011.
  4. R Agrawal, R. Srikant "Privacy-Preserving Data Mining," Proceedings of the ACM SIGMOD Conference, 2000.
  5. Toon Calders and Sicco Verwer "Three naive Bayes approaches for discrimination-free classification," July 2010.
  6. Faisal Kamiran and Toon Calders "Data preprocessing techniques for classification without discrimination," Nov 2011.
  7. Sara Hajian, Josep Domingo-Ferrer, Antoni Martinez-Balleste " Discrimination Prevention in Data Mining for intrusion and Crime detection," Conference on Computational Intelligence in Cyber Security (CICS), IEEE Symposium 2011.
  8. F Kamiran, T Calders, M Pechenizkiy Discrimination Aware decision Tree Learning," Data Mining (ICDM), 2010 IEEE 10th International Conference 2010.
  9. S Hajian, J Domingo-Ferrer "A Methodology for direct and Indirect discrimination Prevention in Data Mining," IEEE Transactions on knowledge and data engineering, 2013.
  10. Charu C.Agarwal "A General Survey of Privacy-Preserving Data Mining Models and Algorithms ," IBM T. J. Watson Research Center Hawthorne, Philip S. Yu Chicago.
  11. Cynthia Dwork and Frank McSherry in collaboration with Ilya Mironov and Kunal Talwar. " Privacy Preserving Data Mining".
  12. Shuvro Mazumder " Privacy Preserving Data Mining," Department of Computer Science, University of Washington, Seattle.
  13. Rakesh Agrawal, Ramakrishnan Srikant "Fast Algorithms for Mining Association Rules ," IBM Almaden Research Centre .
  14. Aleksandra Korolova "Protecting Privacy When mining and sharing user data," a dissertation Submitted to stanford university for doctor of philosophy August 2012.
  15. Songtao Guo "Analysis of and Techniques for Privacy Preserving Data mining ,"A dissertation submitted to The University of North Carolina at Charlotte for Doctor of Philosophy 2007.
  16. Arie Friedman "Privacy Preserving Data Mining," Research Thesis submitted to the Technion | Israel Institute of Technology for Doctor of Philosophy 2011.
  17. Bhupendra Kumar Pandya,Umesh Kumar Singh ,Keerti Dixit "A Robust Privacy Preservation by Combination of Additive and Multiplicative Data Perturbation for Privacy Preserving Data Mining,". Institute of Computer Science Vikram University, Ujjain, International Journal of Computer Applications(IJCA) , June 2015.
  18. Arvind Batham, Mr.Srikant Lade, Mr. Deepak Patel "A Robust Data Preserving Technique by K-Anonymity and Hiding Association Rules,"Research paper , Rajiv Gandhi Technical University, Bhopal ,International Journal of Advanced Research in Computer Science and Software Engineering(IJARCSSE) January 2014.
  19. Mohamed R. Fouad, Khaled Elbassioni, Member, IEEE, and Elisa Bertino, Fellow, IEEE "A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization" IEEE Transactions On Knowledge And Data Engineering July 2014
  20. Vehuad Lindell "Privacy Preserving Data Mining," Department. of CSE Israel and Benny Pinkas STAR Lab, Santa Clara, CA.
  21. Cecilina Parng, Presentation on Theme "Data Mining "Jan 2014
  22. Markus Hegland " The Apriori Algorithm," WSPC/Lecture Notes series a Tutorial By CMA,Australian National University March 2005.
  23. Ramakrishnan Srikant " Privacy Preserving Data Mining Challenges & Opportunities," .
  24. Mrs. Bharati M. Ramageri " Data Mining Techniques And Applications," Lecturer Modern Institute of Technology and Research,Computer Application Deptt. , Pune, Indian Journal of Computer Science and Engineering (IJCSE) Vol. 1,2014.

Downloads

Published

2018-12-30

Issue

Section

Research Articles

How to Cite

[1]
Priya Ranjan, Raj Kumar Paul, " A Robust Privacy Preserving of Multiple and Binary Attribute by Using Super modularity with Perturbation, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.121-132, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT183838