We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Modified Anonymity Model for Privacy Preserving Data Mining

by P. Usha, R. Shriram, W. Aisha Banu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 17
Year of Publication: 2013
Authors: P. Usha, R. Shriram, W. Aisha Banu
10.5120/10728-5683

P. Usha, R. Shriram, W. Aisha Banu . Modified Anonymity Model for Privacy Preserving Data Mining. International Journal of Computer Applications. 64, 17 ( February 2013), 26-32. DOI=10.5120/10728-5683

@article{ 10.5120/10728-5683,
author = { P. Usha, R. Shriram, W. Aisha Banu },
title = { Modified Anonymity Model for Privacy Preserving Data Mining },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 17 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number17/10728-5683/ },
doi = { 10.5120/10728-5683 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:17:28.479818+05:30
%A P. Usha
%A R. Shriram
%A W. Aisha Banu
%T Modified Anonymity Model for Privacy Preserving Data Mining
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 17
%P 26-32
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data Mining plays a vital role in today's information-oriented world where it has been widely applied in various organizations. The current trend is that organizations need to share data for mutual benefit. This has led to a lot of concern over privacy in the recent years. It has also raised a potential threat of revealing sensitive data of an individual when the data is released publicly. Various methods have been proposed to tackle the privacy preservation problem. But the recurring problem is information loss. The loss of sensitive information about certain individuals may affect the data quality and in extreme cases the data may become completely useless. In recent years Privacy preserving data mining has emerged as a key domain of research. One of the methods used for preserving privacy is k-anonymization. k-anonymity demands that every tuple in the dataset released be indistinguishably related to no fewer than k respondents. But the distribution preservation is not guaranteed. In this work a modified k-anonymity model is introduced where the privacy in a dataset is preserved while preserving the distribution also.

References
  1. R. C. Wong, Y. Liu, J. Yin, Z. Huang, A. W. Chee and J. Pe, " (?,k)-anonymity Based Privacy Preservation by Lossy join" , APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th International Conference on Web-age Information Management Conference (2007) .
  2. R. Agrawal, R. Srikant, " Privacy preserving data mining ", ACM SIGMOD International Conference on Management of data, SIGMOD '00 Proceedings(2000).
  3. R. J. Bayardo, R. Agrawal, " Data privacy through optimal k- anonymization", 21st International Conference on Data Engineering, ICDE '05 Proceedings(2005)
  4. C. M. Fung, K. Wang, P. S. Yu, "Top-down specialization for information and privacy preservation", 21st International Conference on Data Engineering, ICDE '05 Proceedings(2005)
  5. P. Samarati, "Protecting respondents identities in micro data release", IEEE Transactions on Knowledge and Data Engineering archive, Volume 13, Issue 6(November 2001)
  6. A. C. Chaaru and P. S. Yu , "On Static and Dynamic Methods for Condensation-Based Privacy-Protection Data Mining", ACM transaction on Database Systems, Volume 33,no 1 article 2 2,Publication Date: March 2008
  7. V. Jaideep, C. Clifton, M. Kantarcioglu , P. A. Scott " Privacy-preserving decision trees over vertically partitioned data", ACM transaction on Knowledge Discovery from data, vol 2 No 3, article 14, Publication date : October 2008.
  8. L. Sweeney, "Achieving k-anonymity privacy protection using generalization and suppression" International Journal of Uncertainty, Fuzziness and Knowledge Based Systems, Vol 10(5), pp. 571–588(2002)
  9. Bhavana Abad (Khivsara) and Kinariwala S. A. , "A Novel approach for Privacy Preserving in Medical Data Mining using Sensitivity based anonymity" InternationalJournal of Computer Applications (0975 – 8887) Volume 42–No. 4, March 2012
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining Privacy preserving k- anonymity Sensitive attributes