Multiplicative Data Perturbation Using Fuzzy Logic in Preserving Privacy

In Data mining is the method of extracting the knowledge from huge amount of data and interesting patterns. With the rapid increase of data storage, cloud and service-based computing, the risk of misuse of data has become a major concern. Protecting sensitive information present in the data is crucial and critical. Data perturbation plays an important role in privacy preserving data mining. The major challenge of privacy preserving is to concentrate on factors to achieve privacy guarantee and data utility. We propose a data perturbation method that perturbs the data using fuzzy logic and random rotation. It also describes aspects of comparable level of quality over perturbed data and original data. The comparisons are illustrated on different multivariate datasets. Experimental study has proved the model is better in achieving privacy guarantee of data, as well as data utility.

[1]  Robert LIN,et al.  NOTE ON FUZZY SETS , 2014 .

[2]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[3]  Thanveer Jahan Privacy Preserving Clustering on Distorted data , 2012 .

[4]  Philip S. Yu,et al.  A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.

[5]  Ling Liu,et al.  A Random Rotation Perturbation Approach to Privacy Preserving Data Classification , 2005 .

[6]  C. V. Guru Rao,et al.  A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy , 2014 .

[7]  Syed,et al.  A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING , 2014 .

[8]  V. Valli Kumari,et al.  Fuzzy based approach for privacy preserving publication of data , 2008 .

[9]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[10]  Keke Chen,et al.  Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[12]  C. V. Guru Rao,et al.  Data perturbation and feature selection in preserving privacy , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).

[13]  Ran Wolff,et al.  k-TTP: a new privacy model for large-scale distributed environments , 2004, KDD.

[14]  Ramakrishnan Srikant,et al.  Hippocratic Databases , 2002, VLDB.

[15]  P. Kamakshi,et al.  A Novel Framework to Improve the Quality of Additive Perturbation Technique , 2011 .

[16]  B. Karthikeyan,et al.  A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING , 2011 .