Privacy-Preserving in Data Mining using Anonymity Algorithm for Relational Data
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 295

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016 | Popularity: 6.5 / 10


     

Privacy-Preserving in Data Mining using Anonymity Algorithm for Relational Data

Karan Dave, Chetna Chand


Abstract: Data mining is the process of analyzing data from different perspectives. To summarize it into useful information, we can consider several algorithms. To protect data from unauthorized user in this case is a problem to solve. Access control mechanisms protect sensitive information from unauthorized users. But if the privacy protected information is not in proper format, again the user will compromise the privacy and quality of data. A privacy protection mechanism can use suppression and generalization of relational data to anonymize and satisfy privacy requirements, e. g. , k-anonymity and l-diversity, against identity and attribute disclosure. However, privacy is achieved at the cost of precision of authorized information. In this paper, we propose an accuracy-constrained privacy-preserving access control framework. The access control policies define selection predicates available to roles while the privacy requirement is to satisfy the k-anonymity or l-diversity. An additional constraint that needs to be satisfied by the PPM is the imprecision bound for each selection predicate. The techniques for workload-aware anonymization for selection predicates have been discussed in the literature. However, to the best of our knowledge, the problem of satisfying the accuracy constraints for multiple roles has not been studied before. In our formulation of the aforementioned problem, we propose heuristics for anonymization algorithms and show empirically that the proposed approach satisfies imprecision bounds for more permissions and has lower total imprecision than the current state of the art.


Keywords: Data mining, Data Integrity, Data privacy, Anonymization, K anonymity, L diversity


Edition: Volume 5 Issue 3, March 2016


Pages: 1694 - 1698


DOI: https://www.doi.org/10.21275/NOV162221



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Karan Dave, Chetna Chand, "Privacy-Preserving in Data Mining using Anonymity Algorithm for Relational Data", International Journal of Science and Research (IJSR), Volume 5 Issue 3, March 2016, pp. 1694-1698, https://www.ijsr.net/getabstract.php?paperid=NOV162221, DOI: https://www.doi.org/10.21275/NOV162221

Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 1659 - 1668

Anomaly Detection: Enhancing Systems with Machine Learning

Yogananda Domlur Seetharama

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 1793 - 1802

Event - Driven Architecture: Building Responsive and Scalable Systems

Venkata Naga Sai Kiran Challa

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 772 - 776

Cryptographic Algorithm to Augment Data Security

Vipin R Bharadwaj, Nalina V, Rithvik Mohan V

Share this Article
Top