Geometric Data Perturbation for Privacy Preserving in Data Stream Mining

Authors

  • Mayur Prajapati  Computer Engineering Department Silver oak College of Engineering & Technology Ahmedabad, India
  • Aniket Patel  Information Technology Department Silver oak College of Engineering & Technology Ahmedabad, India

Keywords:

Data Mining, Data Stream Mining, Privacy, Geometric Data Perturbation

Abstract

Today as we have tendency to live within the era of information explosion. It’s become important to search for helpful data from large dataset. Additionally advance in web communication and hardware technology has lead to raise within the capability of storing personal information of people. Huge quantity of data stream are generated from completely different applications like shopping record, medical, network traffic etc. Sharing such type of information is incredibly important plus to business decision but the worry is that when the non-public information is leaked it may be abused for a different purposes. Therefore some quantity of privacy preserving must be done on the information before it is free to others. Ancient ways of Privacy Preserving Data Mining (PPDM) area unit designed for static information sets that makes its unsuitable for dynamic data streams. In this paper an economical and effective information perturbation methodology is proposed that aims to protect the privacy of sensitive attributes and obtaining information bunch with minimum information loss.

References

  1. Prof. M. Natwaria, S. Arya, "Privacy Preserving Data Mining- "A State of Art", In the Proceeding of the 2016 International Conference on Computing for Suitable Global Development (INDIACom), pp.2108-2112, 2016.
  2. W.T.Chembian, Dr. J. Janet, "A Survey on Privacy Preserving Approaches and Techniques", In the Proceeding of the International Conference on Information Science and Applications, Chennai, India,pp.700-703, 2010.
  3. P. Lahane, R. K. Bedi, P. Halgonkar, "Data Stream Mining", International Journal of Advances in Computing and Information Researches, Volume-1, 2012
  4. L. Golab, M. Tamer Ozsu, "Data Stream Management Issues-A Survey", Technical Report CS-2003-08, 2003.
  5. M. Kholghi, M. Keyvanpour, "An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirement", International Journal of Engineering Science and Technology, Volume-3, pp.2507-2513, 2011.
  6. M. Khalilian, N. Mustapha, "Data Steam Clustering: Challenges and Issues", In Proceeding of the international Multi Conference of Engineering and Computer Scientists 2010, Volume-1, 2010.
  7. N. Gupta, I. Rajput, "Preserving Privacy Using Data Perturbation in Data Stream", International Journal of Advanced Research in Computer Engineering & Technology, Volume-2, pp.1699-1704, 2013.
  8. A. Patel, K. Dodiya, S. Patel, "A Survey on Geometric Data Perturbation in multiplicative Data Perturbation", International Journal of Research in Advent Technology, pp.603-607, 2013.
  9. V. S. Verykois, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, Y. Theodoridis, "State-of-the-Art in Privacy Preserving data Mining", IEEE, pp.1-5, 2009.
  10. A. Shah, R. Gulati, "Evaluating Applicability of Perturbation Techniques For Privacy Preserving Data Mining By Descriptive Statistics", In Proceeding of the 2016 Intl. Conference on Advance in Computing, Communications and Informatics, Jaipur, pp.607-613, 2016.
  11. S. Chidambaram, K. G. Srinivasagam, "A Combined Random Noise Perturbation Approach for Multi Level Privacy Preserving in Data Mining", In Proceeding of the 2014 International Conference on Recent Trends in Information Technology" ,2014.
  12. H. Li, "Study of Privacy Preserving Data Mining", Third International Symposium on Intelligent Information Technology and Security Informatics, pp.700-703, 2010.
  13. O. Kale, P. Patel, "A Survey on Privacy Preserving Data Mining", Global Journal of Advanced Engineering Technologies, Volume-2, Issue-3, pp.143-147, 2013.
  14. Rajesh N., Sujatha K., A. Selvakumar, "Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms", International Journal of Computer Applications, Volume-113, Issue-27, pp. 30-33, 2016.
  15. K. N. Vachhani, D. B. Vaghela, "Geometric Data Transformation for Privacy Preserving on Data Stream Using Classification", International Journal of Innovative Research in Computer and Communication Engineering, Volume-3, Issue-6, pp.6013-6019, 2015.
  16. K. Dodiya, S. Yagnik, "Classification Techniques for Geometric Data Perturbation in Multiplicative Data Perturbation", International Journal of Engineering Development and Research, pp.2380-2383, 2014.
  17. M. Sharma, A. Chaudhary, M. Mathuria, S. Chaudhary, S. Kumar, " An Efficient Approach for Privacy Preserving in Data Mining", In Proceeding of the 2014 International Conference on Signal Propagation and Computer Technology, pp.244-249, 2014.
  18. H. Chhinkaniwala, A. Patel, S. Garg, "Geometric Transformation Based Multiplicative Data Perturbation for Privacy Preserving Data Mining", IEEE, 2013.
  19. J. Liu, Y. XU, "Privacy Preserving Clustering by Random Response Method of Geometric Transformation", In Proceeding of the 2014 Fourth International Conference on Internet Computing for Science and Engineering", pp.181-188, 2010.
  20. A. S. Shanthi, M. Karthikeyan, "A Review on Privacy Preserving Data Mining", IEEE, 2012.
  21. A. Bifet, G. Holmes and B. Pfahringer, Massive Online Analysis, a Framework for Stream Classification and Clustering. JMLR: Workshop and Conference Proceedings 11, 2010. pp: 44-50.
  22. MOA datasets, http://moa.cs.waikato.ac.nz/datasets.
  23. UCI Machine Learning Repository, http://archive.ics.uci.edu/ml/datasets/.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Mayur Prajapati, Aniket Patel, " Geometric Data Perturbation for Privacy Preserving in Data Stream Mining, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 8, pp.204-210, May-June-2018.