CFP last date
20 December 2024
Reseach Article

A Novel Method for Preserving Privacy in Big-Data Mining

by Nasrin Irshad Hussain, Bharadwaj Choudhury, Sandip Rakshit
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 16
Year of Publication: 2014
Authors: Nasrin Irshad Hussain, Bharadwaj Choudhury, Sandip Rakshit
10.5120/18159-9378

Nasrin Irshad Hussain, Bharadwaj Choudhury, Sandip Rakshit . A Novel Method for Preserving Privacy in Big-Data Mining. International Journal of Computer Applications. 103, 16 ( October 2014), 21-25. DOI=10.5120/18159-9378

@article{ 10.5120/18159-9378,
author = { Nasrin Irshad Hussain, Bharadwaj Choudhury, Sandip Rakshit },
title = { A Novel Method for Preserving Privacy in Big-Data Mining },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 16 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number16/18159-9378/ },
doi = { 10.5120/18159-9378 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:34:44.685531+05:30
%A Nasrin Irshad Hussain
%A Bharadwaj Choudhury
%A Sandip Rakshit
%T A Novel Method for Preserving Privacy in Big-Data Mining
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 16
%P 21-25
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As our daily lives has become digitization which led to an explosion in the collection of data by organization and individuals. Organization push their vast amount of data into big data clusters, but most have implemented zero security measures. Protection on confidentiality of these data is very important. In recent years privacy-preserving data mining has been emerged as a popular research area for the security of sensitive information in the network. In this field we study the extraction of knowledge or pattern from big data maintaining the commercial or legislative privacy constraints. Privacy preserving mining of distributed data has diverse applications. We have numerous algorithmic techniques for privacy preserving data mining. This paper presents a privacy preserving method for big data. We proposed a novel method for preserving privacy in mining big databases. Our goal is to mining the data while preserving data privacy and confidentiality.

References
  1. Gartner, Post event brief, Gartner IT Infrastructure, Operations and Management Summit 2009, Orlando, FL. available at www. gartner. com June 23–25 2009
  2. IDC, Digital data to double every 18 months, worldwide marketplace model and forecast, Framingham, MA. available at www. idc. com May 2009.
  3. data mining using Matrix Algebraic Approach",doi:10. 4156/jcit. vol4. issue3. 5.
  4. Arie Friedman,"Privacy preserving data mining"pp. 4,January 2011
  5. P. Russom, Big Data Analytics, Best Practices Report, Fourth Quarter, The DataWarehouse Institute , Renton, WA, September 18 2011.
  6. Big Data Analytics for Security Intelligence,september 2013
  7. R. Agrawal, R. Srikant, "Privacy-preserving data mining", In: Proceedings of the 2000ACM-SIGMOD on management of data, Dallas, TX, USA, May 15-18, 2000
  8. S. R. M. Oliveira, O. R. Zaiane, "Privacy Preserving Clustering By Data Transformation", In Proc. Of the 18th Brazilian Symposium on Databases, Manaus, Brazil, October 2003, pages 304-318.
  9. A. Inan, Y. Saygin, E. Savas, A. Hintoglu, A. Levi. : Privacy-Preserving Clustering on Horizontally Partitioned Data. Data Engineering Workshops, 2006.
  10. Z. Teng, W. Du, "A hybrid multi-group approach for privacy preserving decision tree building", In: Proceedings of the 11th Paci_c-Asia conference on knowledge discovery and data mining (PAKDD2007).
  11. B. Pinkas, "Cryptographic techniques for privacy-preserving data mining", SIGKDD Explore, 2002, 4(2): 12-19
  12. "Big security for big data", available at www8. hp. com/ww/en/secure/pdf/4aa4-4051enw. pdf
  13. N. I. Hussain,P. Saikia,B. Choudhury, S. Rakshit,"Study of a Decision tree approach to analyse Big data",pp. 2,published on Micro-2014.
  14. Brian Lent, Arun Swami, Jennifer Widom,"Clustering Association Rule".
  15. Abraham Otero,"Data mining techniques",pp25-36/39.
  16. M. Kalita, D. K. Bhattacharyya, M. Dutta, "Privacy Preserving Clustering - A Hybrid Approach", In: Proceedings of the ADCOM'08, Chennai, December 2008.
  17. Alaa H Al Hamami, Suhad Abu Shehab, " An Approach for Preserving Privacy and knowledge In Data Mining Apllication", Journals of Emerging trends in computing and information science,vol. 4,No1 jan 2013.
  18. Searchsecurity. techtarget. com/digital-signature
Index Terms

Computer Science
Information Sciences

Keywords

Privacy-preserving data mining security distributed data big data