A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy

The latest advances in the field of information technology have increased enormous growth in the data collection in this era. Individual’s data are shared for business or legal reasons, containing sensitive information. Sharing data is a mutual benefit for business growth. The need to preserve privacy has become a challenging problem in privacy preserving data mining. In this paper we deal with a data analysis system having sensitive information. Exposing the information of an individual leads to security threats and could be harmful. The confidential attributes are perturbed or distorted using fuzzy logic. Fuzzy logic is used to protect individual’s data to hide details of data in public. Data is owned by an authorized user, and applies distortion. The Authorized user having original dataset distorts numeric data using S-fuzzy membership function. This distorted data is published to the analyst, hiding the sensitive information present in the original data. The analysts perform data mining techniques on the distorted dataset. Accuracy is measured using classification and clustering techniques generated on distorted data is relative to the original, thus privacy is achieved. Comparison of various classifiers is generated on the original and distorted datasets.

[1]  Jie Wang,et al.  Data Distortion for Privacy Protection in a Terrorist Analysis System , 2005, ISI.

[2]  V. Valli Kumari,et al.  Fuzzy based approach for privacy preserving publication of data , 2008 .

[3]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[4]  T. Ross Fuzzy Logic with Engineering Applications , 1994 .

[5]  Benny Pinkas,et al.  Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.

[6]  Sushil Jajodia,et al.  A Privacy-Enhanced Microaggregation Method , 2002, FoIKS.

[7]  Shuting Xu,et al.  Fast Fourier Transform Based Data Perturbation Method for Privacy Protection , 2007, 2007 IEEE Intelligence and Security Informatics.

[8]  Aryya Gangopadhyay,et al.  A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms , 2006, The VLDB Journal.

[9]  Rathindra Sarathy,et al.  Data Shuffling - A New Masking Approach for Numerical Data , 2006, Manag. Sci..

[10]  Josep Domingo-Ferrer,et al.  Privacy in Data Mining , 2005, Data Mining and Knowledge Discovery.

[11]  Timothy J. Ross,et al.  Fuzzy Logic with Engineering Applications: Ross/Fuzzy Logic with Engineering Applications , 2010 .

[12]  B. Karthikeyan,et al.  A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING , 2011 .

[13]  Stephen E. Fienberg,et al.  Data Swapping: Variations on a Theme by Dalenius and Reiss , 2004, Privacy in Statistical Databases.

[14]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[15]  C. V. Guru Rao,et al.  Data perturbation and feature selection in preserving privacy , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).