Call for Paper

CAE solicits original research papers for the July 2021 Edition. Last date of manuscript submission is June 30, 2021.

Read More

C Privacy Prevention of Discriminating Rules by Perturbing Sensitive Items

Deepak Patel, Vineet Richhariya. Published in Security.

Communications on Applied Electronics
Year of Publication: 2015
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Deepak Patel, Vineet Richhariya
10.5120/cae2015651825

Deepak Patel and Vineet Richhariya. Article: C Privacy Prevention of Discriminating Rules by Perturbing Sensitive Items. Communications on Applied Electronics 2(8):12-16, September 2015. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Deepak Patel and Vineet Richhariya},
	title = {Article: C Privacy Prevention of Discriminating Rules by Perturbing Sensitive Items},
	journal = {Communications on Applied Electronics},
	year = {2015},
	volume = {2},
	number = {8},
	pages = {12-16},
	month = {September},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

With the increase of digital data on servers different approach of data mining is done. This lead to important issue of proving privacy to the unfair information against any person, place, community etc. So Privacy preserving mining come in existence. This paper provide privacy for sensitive rule that discriminate data on the basis of community, gender, country, etc. So finding of those rules and suppression is done. Perturbation technique is use for the hiding sensitive rules. Experiment is done on real adult dataset for different ratio. Results shows that proposed work is better in maintaining the originality, reduce execution time, reduce data loss, at last suppress rules while other rules are remain unaffected.

References

  1. Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang, In IEEE Systems Journal, VOL. 7, NO. 3, SEPTEMBER 2013, pp. 385-395. “Privacy-Preserving Mining of Association Rules from Outsourced Transaction Databases”
  2. C. Tai, P. S. Yu, and M. Chen, in Proc. Int. Knowledge Discovery Data Mining, 2010, pp. 473–482. “K-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining,”
  3. W.K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis, in Proc. Int. Conf. Very Large Data Bases, 2007, pp. 111–122. “Security in outsourcing of association rule mining,”
  4. K.Sathiyapriya and Dr. G.Sudha Sadasivam, In IJKDP Vol.3 No 2– March-2013, pp 119-131. “ A Survey on Privacy Preserving Association Rule Mining”
  5. R. Agrawal and R. Srikant, in Proc.ACM SIGMOD Int. Conf. Manage. Data, 2000, pp. 439–450. “Privacy-preserving data mining,”
  6. M.Mahendran, 2Dr.R.Sugumar International Journal of Advanced Research in Computer and Communication Engineering. Vol. 1, Issue 9, November 2012. “An Efficient Algorithm for Privacy Preserving Data Mining Using Heuristic Approach”
  7. Z. Yang and R. N. Wright. In IEEE Trans. on Knowledge and Data Engineering , 2006, pp.1253–1264. “Privacy-preserving computation of bayesian networks on vertically partitioned data.”
  8. Yaping Li, Minghua Chen, Qiwei Li, and Wei Zhang. IEEE transaction on knowledge data engineering, VOL. 24, NO. 9, SEPTEMBER 2012. “Enabling Multilevel Trust in Privacy Preserving Data Mining”
  9. Sara Hajian and Josep Domingo-Ferrer. “A Methodology for Direct and Indirect Discrimination Prevention in Data Mining”. IEEE transaction on knowledge data engineering, VOL. 25, NO. 7, JULY 2013.
  10. Mohamed R. Fouad, Khaled Elbassioni, and Elisa Bertino. IEEE transaction on knowledge data engineering VOL. 26, NO. 7, JULY 2014. A Supermodularity-Based Differential “Privacy Preserving Algorithm for Data Anonymization”.
  11. F. Kamiran, T. Calders, and M. Pechenizkiy, Proc. IEEE Int’l Conf. Data Mining (ICDM ’10), pp. 869-874, 2010. “Discrimination Aware Decision Tree Learning,”
  12. D. Pedreschi, S. Ruggieri, and F. Turini, Proc. 14th ACM Int’l Conf. Knowledge Discovery and Data Mining (KDD ’08), pp. 560-568, 2008. “Discrimination-Aware Data Mining,”
  13. D. Pedreschi, S. Ruggieri, and F. Turini, Proc. Ninth SIAMData Mining Conf. (SDM ’09), pp. 581-592, 2009. “Measuring Discrimination in Socially-Sensitive Decision Records,”
  14. Yogachandran Rahulamathavan, Raphael C.-W. Phan, Suresh Veluru, Kanapathippillai Cumanan and Muttukrishnan Rajarajan IEEE IEEE transaction on dependable and secure computing, VOL. 11, NO. 5, September 2014. .“Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud “.
  15. R. Kohavi and B. Becker, “http://archive.ics.uci.edu/ml/ datasets /Adult, 1996. UCI Repository of Machine Learning Databases,”.

Keywords

Keywords are your own designated keywords which can be used for easy location of the manuscript using any search engines.