CFP last date
20 May 2024
Reseach Article

Privacy Preserving Data Mining and Data Exposure Technique and Performance Study

by Ankita Sharma, Pankaj Jagtap
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 170 - Number 5
Year of Publication: 2017
Authors: Ankita Sharma, Pankaj Jagtap
10.5120/ijca2017914838

Ankita Sharma, Pankaj Jagtap . Privacy Preserving Data Mining and Data Exposure Technique and Performance Study. International Journal of Computer Applications. 170, 5 ( Jul 2017), 22-25. DOI=10.5120/ijca2017914838

@article{ 10.5120/ijca2017914838,
author = { Ankita Sharma, Pankaj Jagtap },
title = { Privacy Preserving Data Mining and Data Exposure Technique and Performance Study },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 170 },
number = { 5 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume170/number5/28066-2017914838/ },
doi = { 10.5120/ijca2017914838 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:17:40.800002+05:30
%A Ankita Sharma
%A Pankaj Jagtap
%T Privacy Preserving Data Mining and Data Exposure Technique and Performance Study
%J International Journal of Computer Applications
%@ 0975-8887
%V 170
%N 5
%P 22-25
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The data mining is used in various applications in order to provide decisions, pattern matching and others. In order to mine data, it is required to initially learn from the data and then extract the patterns from data which is supplied in raw formats. Sometimes data is available in parts and need to conclude the outcomes from the data in secure manner. Therefore a technique is required that securely combine data from all the participating partitions of the data. Mine the combined data for extracting the meaningful pattern in a secured manner. Finally disclose the data in such manner which is utilized by the different other application, without disturbing the outcomes of the final application decisions. In order to design and demonstrate the three parties of data are considered for combining them, and mine them. And finally using the C4.5 classification algorithm is applied to find the final utilization on different application. To find that the mining decision is not varied from the initial values of mining the comparison is made between the disclosed data and initial dataset on the basis of accuracy of classification. The experimental results demonstrate a very fewer patterns are misclassified after in comparison of the initial dataset classification in terms of accuracy.

References
  1. R. Hariharan, C. Mahesh, P. Prasenna and R. Vinoth Kumar, “Enhancing Privacy Preservation in Data Mining using Cluster based Greedy Method in Hierarchical”, Indian Journal of Science and Technology, Vol 9(3), January 2016
  2. Zakaria Gheid, Yacine Challal, “Efficient and Privacy-Preserving k-means clustering For Big Data Mining”, IEEE TristCom, Aug 2016, Tianjin, China pp.791 - 798, 2016, TrustCom
  3. Rajesh N, Sujatha K., A. Arul Lawrence, “Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms”, International Journal of Computer Applications (0975 – 8887) Volume 133 – No.7, January 2016
  4. Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, and Jun Shao, “Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases”, Transactions on Information Forensics and Security, 1556-6013 (c) 2016 IEEE
  5. V. Shyamala Susan and T. Christopher, “Privacy Preserving Data Mining Using Multiple Objective Optimization”, ICTACT Journal On Soft Computing, October 2016, Volumn: 07, ISSUE: 01.
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining Privacy Preserving Data Mining Data Exposure Classification Vertical Partitioning Of Data