A Comprehensive Analysis Of Normalization Approaches For Privacy Protection In Data Mining

Authors

  • Surendra Kumar Reddy Koduru  Business Intelligence & Reporting Lead, NC, USA

DOI:

https://doi.org/10.32628/CSEIT1228529

Keywords:

Data Privacy, Data Accuracy, Privacy Preservation, Z-Score Normalization, Normalization, Privacy

Abstract

Data Mining is a fundamental method of extracting large volumes of data sets by unfamiliar patterns. These extracted data can be shared between enterprises to improve their corporate benefits. For the data mining process, sharing such confidential data is very important. It is very important to safeguard such information against unwanted exposure that leads to privacy leakage. In recent days, privacy in various data mining applications has become very important. In order to overcome such problem privacy, data mining techniques are preserved. It provides accurate data mining results without scarifying the original data values and ensures both accuracy and privacy. Data protection is achieved through the analysis of the data using normalization techniques in this proposed work. The approach proposed in comparison the effects of min-max, decimal scaling, and Z-Score normalization techniques. Experimental effects confirmed that the Min-max Standardization technology archived the most precision with minimum data loss.

References

  1. M. Chen, J. Han, and P. Yu, “Data mining: An Overview from a database Prospective”, IEEE Trans. on Knowledge and Data Engineering, vol. 8, no. 6, pp. 866-883, Dec. 1996.
  2. Ajmeera Kiran , D. Vasumathi, “Optimal Privacy Preserving Technique over Big Data Analytics using Oppositional Fruit fly Algorithm” Recent Patents on Computer Science , Vol. 11, Issue: 0, DOI :10.2174/2213275911666181119113913, pp: 1-12 , 2018.
  3. C. P. Chen and C. Y. Zhang, “Data-intensive applications, challenges, techniques and technologies: A survey on Big Data”, Information Sciences, Vol. 275, pp. 314-347, 2014.
  4. Atallah, M., Elmagarmid, A., Ibrahim, M., Bertino, E., Verykios.V:Disclosure limitation of sensitive rules, Workshop on Knowledge and Data Engineering Exchange, 1999.
  5. K.Liu, H Kargupta, and J.Ryan,” Random projection–based multiplicative data perturbation for privacy preserving distributed data mining .” IEEE Transaction on knowledge and Data Engg.Jan,pp.92-106,2006.
  6. Kiran Ajmeera, Vasumathi D, “A Comprehensive Survey on Privacy Preservation Algorithms in Data Mining” Proceedings of the 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC-2017), 978-1-5090-6621-6/17/$31.00 , 2017.
  7. UCI Machine Learning Repository http://archive.ics.uci.edu/ml/datasets.html.
  8. J.Nageswara Rao, M.Ramesh,” A Review on Data Mining & Big Data, Machine Learning Techniques”, International Journal of Recent Technology and Engineering (IJRTE) , ISSN: 2277-3878, Volume-7 Issue-6S2, April 2019.
  9. D.  Veeraiah and J.  N.Rao,  "An  Efficient  Data  Duplication  System  based  on  Hadoop Distributed  File  System,"2020  International  Conference  on  Inventive  Computation Technologies (ICICT), 2020, pp. 197-200, doi: 10.1109/ICICT48043.2020.9112567.
  10. J. N. Rao, A. C. Singh, “A novel encryption system using layered cellular automata,” International Journal of Engineering Research and Applications, vol. 2, no. 6, pp. 912–917, 2012.
  11. J.Nageswara Rao, Bhupal Naik, G Sai Lakshmi, V Ramakrishna Sajja, D Venkatesulu, “Driver’s Seat Belt Detection Using CNN” Turkish Journal of Computer and Mathematics Education Vol.12 No.5 (2021), 776-785 3.
  12. J.N Rao, Dr.Rambabu Busi, Dr. G Rajendra Kumar, U. Surya Kameswari, “ Content image Retrieval Based on using open Computer Vision and Deep Learning Techniques “International Journal of Advanced Science and Technology,Volume29Issue03Pages5926 - 593 92020)

Downloads

Published

2022-09-27

Issue

Section

Research Articles

How to Cite

[1]
Surendra Kumar Reddy Koduru, " A Comprehensive Analysis Of Normalization Approaches For Privacy Protection In Data Mining" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 5, pp.144-157, September-October-2022. Available at doi : https://doi.org/10.32628/CSEIT1228529