Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

A Fuzzy Approach for Privacy Preserving in Data Mining

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 57 - Number 18
Year of Publication: 2012
Authors:
M. Sridhar
B. Raveendra Babu
10.5120/9211-3757

M Sridhar and Raveendra B Babu. Article: A Fuzzy Approach for Privacy Preserving in Data Mining. International Journal of Computer Applications 57(18):1-5, November 2012. Full text available. BibTeX

@article{key:article,
	author = {M. Sridhar and B. Raveendra Babu},
	title = {Article: A Fuzzy Approach for Privacy Preserving in Data Mining},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {57},
	number = {18},
	pages = {1-5},
	month = {November},
	note = {Full text available}
}

Abstract

Advances in hardware technology have increased storage and recording capabilities regarding individual's personal data. Privacy preserving of data has to ensure that individual data publishing will refrain from disclosing sensitive data. Data is anonymized to address the data misuse concerns. Recent techniques have highlighted data mining in ways to ensure privacy. Most anonymization techniques are taken from various fields like data mining, cryptography and information hiding. K-Anonymity is a popular approach where data is transformed to equivalence classes and each class has a set of K- records indistinguishable from each other. But there were many problems with this approach and remedies like l-diversity and t-closeness were proposed to overcome them. This paper addresses the problem of Privacy Preserving in Data Mining by transforming the attributes to fuzzy attributes. Due to fuzzification, exact value cannot be predicted thus maintaining individual privacy, and also better accuracy of mining results were achieved.

References

  • Agrawal R. , Srikant R. Privacy-Preserving Data Mining. Proceedings of the ACM SIGMOD Conference, 2000.
  • L. Sweeney. "Datafly: A system for providing anonymity in medical Data". In Intl. Conf. on Database Security, pages 356–381, 1998.
  • L. Sweeney. "K-anonymity: A model for protecting privacy". Intl. Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10(5):557{570), 2002.
  • Martin, D. , Kifer, D. , Machanavajjhala, A. , Gehrke, J. , And Halpern, J. 2006. Worst-case background knowledge in privacy. Tech. rep. , Cornell University.
  • Muralidhar, K. , Batrah, D. , & Kirs, P. J. (1995). Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach. Management Science, 41(9), 1549-1564.
  • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, CMU, SRI, 1998.
  • Bayardo, R. J. And Agrawal, R. 2005. Data privacy through optimal k-anonymization. In Proceedings of the International Conference on Data Engineering (ICDE'05).
  • Lefevre, K. , Dewitt, D. , And Ramakrishnan, R. 2005. Incognito: Efficient fulldomain k-anonymity. In SIGMOD.
  • Zhong, S. , Yang, Z. , And Wright, R. N. 2005. Privacy-enhancing k-anonymization of customer data. In Proceedings of the International Conference on Principles of Data Systems (PODS).
  • Ohrn, A. And Ohno-Machado, L. 1999. Using boolean reasoning to anonymize databases. A. I. Medicine 15, 3, 235–254.
  • Machanavajjhala A. , Gehrke J. , Kifer D. , "l-diversity: privacy beyond k-anonymity". Proceedings of the 22nd IEEE Intl. Conf. on Data Engineering, 2006.
  • S. Zhong, Z. Yang, and R. N. Wright. "Privacy-enhancing k-anonymization of customer data". In PODS, 2005.
  • K. Wang, B. C. M. Fung, and P. S. Yu, "Handicapping Attacker's Confidence: An Alternative to k-Anonymization," Knowledge and Information Systems: J. (KAIS), 2006.
  • Ninghui Li, Tiancheng Li and Suresh. V. " t-Closeness: Privacy beyond k-anonymity and l-diversity". ICDE 2007, 23rd IEEE Intl. Conf. on Data Engineering, 2007.
  • N. Shang, F. Paci, M. Nabeel, and E. Bertino. A privacy-preserving approach to policy-based content dissemination. Technical Report 2009-14, Purdue University Center for Education and Research in Information Assurance and Security (CERIAS), 2009.
  • Wang, Y. , Cui, Y. , Geng, L. , and Liu, H. A newperspective of privacy protection: Unique distinct l-SRdiversity. In Proceedings of PST. 2010, 110-117.
  • V. Valli Kumari, S. Srinivasa Rao, KVSVN Raju, KV Ramana and BVS Avadhani, Fuzzy based approach for privacy preserving publication of data, IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 1, January 2008, pp:115-121.
  • Bayardo R. J. , Agrawal R. : Data Privacy through Optimal k-Anonymization. Proceedings of the ICDE Conference, pp. 217–228, 2005.
  • Frank, A. & Asuncion, A. (2010). UCI Machine Learning Repository [http://archive. ics. uci. edu/ml]. Irvine, CA: University of California, School of Information and Computer Science.