Total views : 122

Privacy Preserving Data using Fuzzy Hybrid Data Transformation Technique

Affiliations

  • Department of Computer Science and Engineering, Manonmaniam Sundaranar University, Chennai – 600017, Tamil Nadu, India
  • Sree Sastha Institute of Engineering and Technology, Chennai – 600113, Tamil Nadu, India

Abstract


Objective: To provide improved privacy for dataset using fuzzy set properties with optimal Information loss, thereby achieving better utility. Methods: We propose Fuzzy Hybrid data Transformation method by combining fuzzy data modification method and Random Rotation Perturbation techniques (RRP). Fuzzy data modification method contains fuzzy K-member clustering along with membership function to be executed to distorted data. RRP preserves the geometric structure on dataset. Findings: Experimentation proves that our method gives least information loss when compared with existing method along with fuzzy membership function individually for different values of k. Thereby, we achieve dual goal of privacy and utility. Applications: The experiment has been done over the Adult dataset derived from UCL Repository and used for numerous applications such as analysis, mining, forecasting and prediction etc.

Keywords

Fuzzy Data Modification, PPDM, Privacy Threats, RRP

Full Text:

 |  (PDF views: 104)

References


  • Ahmed KA, Rauf HA, Rajesh A. Study of K-Anonymization Level with Respect to Information Loss AJBAS. 2016; 10(2):1–8.
  • Aggarwal G, Feder T, Kenthapadi K, Motwani R, Panigrahy R, Thomas D, Zhu A. Approximation Algorithm for K-Anonymity. Journal of Privacy Technology. 2005; 4(2):11–8.
  • Sweeney L, Anonymity K. A Model for Protecting Privacy. International Journal of Uncertainity Fuzziness and Knowledge-Based System. 2002; 10:557–70. Crossre
  • Samarati P. Protecting Respondent’s Identities in Microdata Release. IEEE Transaction on Knowledge and Data Engineering. 2001; 13(6):1010–27. Crossref
  • Ichilhashi H. A Fuzzy Variant of K-member clustering for Collaborative Filtering with Data Anonymization.
  • Proceedings of International conference on IEEE Word Congress on Computational Intelligence, 2012. p. 1–6.
  • Kawano A, Honda K, Notsu A, Ichihashi H. Comparison of membership function in K- member clustering data Anonymization. Proceeding of IEEE International Conference on SCIS-ISIS, 2012. p. 2004–8. Crossref
  • Kamakshi P, Babu AV. A Novel Framework to improve the quality of Additive Perturbation Technique. International Journal of Computer Application. 2011; 30(6):11–6.
  • Rajalaxmi RR, Natarajan AM. An Effective Data Transformation Approach for Privacy Preserving Clustering. Journal of Computer Science. 2008; 4(4):10–7. Crossref
  • Kumari VV, Rao SS. Fuzzy based approach for privacy preserving publication of data. IJCSNS. 2008; 8(4):1–7.
  • Liu J, Yifeng. Privacy preserving clustering by Random Response method of Geometric Transformation.
  • Procedings of 4th International Conference on Internet Computing for Science and Engineering, 2009. p. 181–8.
  • Li L, Zhang Q. A Privacy preserving clustering Techniques using Hybrid data Transformation Method. Proceedings of IEEE International conference, 2009. p. 1502–6. Crossref
  • Poonam, Dutta M. Performance analysis of clustering method for outlier Detection. Proceedings of International conference on Advance Computing and Communication Technology, 2012. p. 89–95. Crossref
  • Karthikeyan B, Manikandan G, Vaithiyanathan V. A Fuzzy Based Approach for Privacy Preserving Clustering. Journal of Theoretical and Applied Information Technology. 2011; 32(2):118–22.
  • Kumar P, Verma KI, Sureka A. Fuzzy Based Clustering Algorithm for Privacy Preserving Data Mining.
  • International Journal Business Information System. 2011; 7(1):27–40. Crossref
  • Syed MD, Ahmed T, Haque S, Tauhid FSM. A Fuzzy Based Approach for Privacy Preserving Clustering. International Journal of Scientific and Engineering Research. 2014; 5(2):1067–71.
  • Manikandan G, Sairam N, Harish V, Saikumar N. Survey on the Use of Fuzzy Membership Function to Ensure Data Privacy. Journal of Pharmaceutical Biological and Chemical Sciences. 2016; 7:344–8.
  • Kamakshi P, Babu AV. A Novel Framework to improve the quality of Additive Perturbation Technique. International Journal of Computer Application. 2011; 30(6):1–6.
  • Lin Z, Wang J, Liu L, Zhang J. Generalized Random Rotation Perturbation for vertically pertitioned Data sets. Proceedings of IEEE International conference, 2009; 4(7):1–4.
  • Syed MD, Ahmed T, Haque S, Thauhid SMF. A Fuzzy based approach for Privacy Preserving clustering. International Journal of Scientific and Engineering. 2014 Feb; 5(2):1–5.
  • UCI Data Repository. Available from http://archive.ics.uci. edu/ml/datasets/Adult Datasets. Accessed on 01/05/1996.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.