CFP last date
20 May 2024
Reseach Article

A Privacy Preserving Data Mining Technique for Preventing Data Discloser and Leakage

by Lokesh Pathak, Keshav Puraswani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 43
Year of Publication: 2019
Authors: Lokesh Pathak, Keshav Puraswani
10.5120/ijca2019919315

Lokesh Pathak, Keshav Puraswani . A Privacy Preserving Data Mining Technique for Preventing Data Discloser and Leakage. International Journal of Computer Applications. 178, 43 ( Aug 2019), 15-20. DOI=10.5120/ijca2019919315

@article{ 10.5120/ijca2019919315,
author = { Lokesh Pathak, Keshav Puraswani },
title = { A Privacy Preserving Data Mining Technique for Preventing Data Discloser and Leakage },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2019 },
volume = { 178 },
number = { 43 },
month = { Aug },
year = { 2019 },
issn = { 0975-8887 },
pages = { 15-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number43/30825-2019919315/ },
doi = { 10.5120/ijca2019919315 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:52:58.784018+05:30
%A Lokesh Pathak
%A Keshav Puraswani
%T A Privacy Preserving Data Mining Technique for Preventing Data Discloser and Leakage
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 43
%P 15-20
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The data is an essential element in any business domain, discloser or leakage of sensitive and private data to others can create a number of social and financial issues. In this context the data mining is shifting towards the privacy preserving data mining. In different real world conditions the end data owner submitted their private and confidential data to a business domain. But due to cretin requirements of business intelligence and marketing research the data discloser is required. In these conditions the discloser or leakage of the actual data owner’s data can create various issues. In this context the proposed work is intended to work with the privacy preserving data mining environment to preserve the data privacy. The proposed data model consists of the three main contributions first designing the noise based data transformation approach. Secondly the data model help to prevent the data discloser to another party. Third the technique by which the data publishing and it’s utility in other public domain becomes feasible. Therefore the proposed work introduces a lightweight privacy preserving data model that combines data from different data sources. Include the regulated noise to entire dataset to modify the values. Process the data using data mining model for finding combined data based decisions and help to publish the data for other marketing and research purposed without disclosing the actual data values. The implementation of the proposed technique is given using JAVA technology and their performance is measured. The obtained results demonstrate the proposed work is helpful for the PPDM based data processing and publishing.

References
  1. Ji-Young Lim, Woo-Cheol Kim, Hongchan Roh, Sanghyun Park, “A Practical Database Security Model Using PurposeBased Database Access Control and Group Concept”, Proceedings of the 2nd International Conference on Emerging Databases (EDB2010)
  2. Introduction to Data Mining and Knowledge Discovery, Dunham, M. H., Sridhar, S., “Data Mining: Introductory and Advanced Topics”, Pearson Education, New Delhi, 1st Edition, 2006.
  3. Phridvi Raj MSB., GuruRao CV (2013) Data mining – past, present and future – a typical survey on data streams. INTER-ENG Procedia Technology 12, pp. 255 – 263
  4. Veepu Uppal and Gunjan Chindwani, “An Empirical Study of Application of Data Mining Techniques in Library System”, International Journal of Computer Applications (IJCA), Volume 74– No.11, July 2013.
  5. Meenakshi and Geetika, “Survey on Classification Methods using WEKA", International Journal of Computer Applications, Vol. 86, No.18, January 2014.
  6. S. Archana and Dr. K. Elangovan, “Survey of Classification Techniques in Data Mining”, International Journal of Computer Science and Mobile Applications, Volume 2 Issue 2, February 2014.
  7. Han, Jiawei, Jian Pei, and Micheline Kamber, Data mining: concepts and techniques, Elsevier, 2011.
  8. Vahida Attar, Pradeep Sinha, and Kapil Wankhade, A fast and light classifier for data streams, Evolving Systems, 1:199–207, 2010.
  9. S. B. Kotsiantis, I. D. Zaharakis and P. E. Pintelas, “Machine learning: a review of classification and combining techniques”, Artificial Intelligent Rev (2006) 26:159–190
  10. “Fundamental Security Concepts”, https://cryptome.org/2013/09/infosecurity-cert.pdf
  11. Philip S. Antón, Robert H. Anderson, Richard Mesic, Michael Scheiern, “Finding and Fixing Vulnerabilities in Information Systems”, © Copyright 2003 RAND
  12. Anor F.A. Dafa-Alla, Eun Hee Kim, Keun Ho Ryu, Yong Jun Heo, “PRBAC: An Extended Role Based Access Control for Privacy preserving Data mining”, Proceedings of the Fourth Annual ACIS International Conference on Computer and Information Science ICIS’05 of IEEE, ’05.
Index Terms

Computer Science
Information Sciences

Keywords

Data mining privacy preserving data mining decision making data publishing data discloser and effects