A Comprehensive Analysis Of Normalization Approaches For Privacy Protection In Data Mining
DOI:
https://doi.org/10.32628/CSEIT1228529Keywords:
Data Privacy, Data Accuracy, Privacy Preservation, Z-Score Normalization, Normalization, PrivacyAbstract
Data Mining is a fundamental method of extracting large volumes of data sets by unfamiliar patterns. These extracted data can be shared between enterprises to improve their corporate benefits. For the data mining process, sharing such confidential data is very important. It is very important to safeguard such information against unwanted exposure that leads to privacy leakage. In recent days, privacy in various data mining applications has become very important. In order to overcome such problem privacy, data mining techniques are preserved. It provides accurate data mining results without scarifying the original data values and ensures both accuracy and privacy. Data protection is achieved through the analysis of the data using normalization techniques in this proposed work. The approach proposed in comparison the effects of min-max, decimal scaling, and Z-Score normalization techniques. Experimental effects confirmed that the Min-max Standardization technology archived the most precision with minimum data loss.
References
- M. Chen, J. Han, and P. Yu, “Data mining: An Overview from a database Prospective”, IEEE Trans. on Knowledge and Data Engineering, vol. 8, no. 6, pp. 866-883, Dec. 1996.
- Ajmeera Kiran , D. Vasumathi, “Optimal Privacy Preserving Technique over Big Data Analytics using Oppositional Fruit fly Algorithm” Recent Patents on Computer Science , Vol. 11, Issue: 0, DOI :10.2174/2213275911666181119113913, pp: 1-12 , 2018.
- C. P. Chen and C. Y. Zhang, “Data-intensive applications, challenges, techniques and technologies: A survey on Big Data”, Information Sciences, Vol. 275, pp. 314-347, 2014.
- Atallah, M., Elmagarmid, A., Ibrahim, M., Bertino, E., Verykios.V:Disclosure limitation of sensitive rules, Workshop on Knowledge and Data Engineering Exchange, 1999.
- K.Liu, H Kargupta, and J.Ryan,” Random projection–based multiplicative data perturbation for privacy preserving distributed data mining .” IEEE Transaction on knowledge and Data Engg.Jan,pp.92-106,2006.
- Kiran Ajmeera, Vasumathi D, “A Comprehensive Survey on Privacy Preservation Algorithms in Data Mining” Proceedings of the 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC-2017), 978-1-5090-6621-6/17/$31.00 , 2017.
- UCI Machine Learning Repository http://archive.ics.uci.edu/ml/datasets.html.
- J.Nageswara Rao, M.Ramesh,” A Review on Data Mining & Big Data, Machine Learning Techniques”, International Journal of Recent Technology and Engineering (IJRTE) , ISSN: 2277-3878, Volume-7 Issue-6S2, April 2019.
- D. Veeraiah and J. N.Rao, "An Efficient Data Duplication System based on Hadoop Distributed File System,"2020 International Conference on Inventive Computation Technologies (ICICT), 2020, pp. 197-200, doi: 10.1109/ICICT48043.2020.9112567.
- J. N. Rao, A. C. Singh, “A novel encryption system using layered cellular automata,” International Journal of Engineering Research and Applications, vol. 2, no. 6, pp. 912–917, 2012.
- J.Nageswara Rao, Bhupal Naik, G Sai Lakshmi, V Ramakrishna Sajja, D Venkatesulu, “Driver’s Seat Belt Detection Using CNN” Turkish Journal of Computer and Mathematics Education Vol.12 No.5 (2021), 776-785 3.
- J.N Rao, Dr.Rambabu Busi, Dr. G Rajendra Kumar, U. Surya Kameswari, “ Content image Retrieval Based on using open Computer Vision and Deep Learning Techniques “International Journal of Advanced Science and Technology,Volume29Issue03Pages5926 - 593 92020)
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.