Enhancing Privacy Preservation in Data Mining using Cluster based Greedy Method in Hierarchical Approach

Background/Objectives: Privacy preservation in data mining to hold back the sensitive data from attackers. Findings: There are various existing methods available to preserve the data like perturbation, anonymization, randomization etc., each method has its own advantages and disadvantages. The trade-off between security and utility of data should be handled with standardizing methods for the PPDM. In this paper explained a method based on PPDM in data mining using cluster based greedy method. Application/Improvements: This method can be applied in sensitive data areas such as hospitals, Customer Management System, government survey, etc., where there is need for privacy preservation.

[1]  Sumit Sarkar,et al.  A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining , 2006, IEEE Transactions on Knowledge and Data Engineering.

[2]  Osmar R. Zaïane,et al.  A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration , 2007, Comput. Secur..

[3]  N. Mookhambika,et al.  PRIVACY PRESERVING DECISION TREE LEARNING USING UNREALIZED DATA SETS , 2013 .

[4]  G. S. Anandha Mala ANONYMIZATION BASED ON NESTED CLUSTERING FOR PRIVACY PRESERVATION IN DATA MINING , 2013 .

[5]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[6]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[7]  R. M. Chandrasekaran,et al.  Design and Implementation of Expert Clinical System for Diagnosing Diabetes using Data Mining Techniques , 2015 .

[8]  Ajay Challagalla,et al.  Privacy preservation in k-means clustering by cluster rotation , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[9]  Hong Shen,et al.  Effective Reconstruction of Data Perturbed by Random Projections , 2012, IEEE Transactions on Computers.

[10]  Yücel Saygin,et al.  Anonymization of Longitudinal Electronic Medical Records , 2012, IEEE Transactions on Information Technology in Biomedicine.

[11]  A. M. Natarajan,et al.  An Effective Data Transformation Approach for Privacy Preserving Clustering , 2008 .

[12]  Yingjie Wu,et al.  Privacy Preserving k-Anonymity for Re-publication of Incremental Datasets , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.

[13]  Slava Kisilevich,et al.  Efficient Multidimensional Suppression for K-Anonymity , 2010, IEEE Transactions on Knowledge and Data Engineering.