Main Article Content
In this work propose different data perturbation techniques that deal with multi dimensional data perturbation and achieve high privacy guarantee and zero- loss of accuracy, various perturbation techniques are used for different classifiers. The main aim is to perturb the multi dimensional data to preserve multi dimensional information. There are three different data perturbation techniques are proposed and their performance are compared. The three data perturbation techniques are Additive Perturbation, Multiplicative Perturbation, Rotation Perturbation. The Proposed system shows that the multiplicative and rotation perturbation makes balance between the privacy and accuracy is done effectively. The performance over the perturbed dataset is greater than the original dataset. Using the classifiers C4.5 and SVM the privacy and accuracy of the proposed techniques are compared.
Bertino E, Ooi BC, Yang Y, Deng RH. Privacy and ownership preserving of outsourced medical data, Proc. 21st Int’l Conf. Data Eng. (ICDE); 2005.
Byun J, Sohn Y, Bertino E, Li N. Secure Anonymization for incremental datasets, Proc. Third VLDB Workshop Secure Data Management; 2006.
Chen K, Liu L. Privacy preserving data classification with rotation perturbation, Proc. IEEE Fifth Int’l Conf. Data Mining; 2005.
Evfimievski A, Srikant R, Agrawal R, Gehrke J. Privacy preserving mining of association rules, Proc. ACM SIGKDD Int’ lc Conf. Knowledge Discovery and Data Mining; 2002.
Huang Z, Du W, Chen B. Deriving private information from randomized data, Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD); 2005.
Kargupta H, Datta S, Wang Q, Sivakumar K. On the privacy preserving properties of random data perturbation techniques, Proc. IEEE Third Int l Conf. Data Mining; 2003.
Liu K, Kargupta H, Ryan J. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining, IEEE Trans. Knowledge and Data Eng. 2006;18(1):92-106.
Wang G, Zhu Z, Du W, Teng Z. Inference analysis in privacy-preserving data re-publishing, Proc. Int’l Conf. Data Mining; 2008.
Xiao X, Tao Y, Chen M. Optimal random perturbation at multiple privacy levels, Proc. Int’l Conf. Very Large Data Bases; 2009.
Singaravelan S, Arun R, Arunshunmugam D, Jerina Catherine Joy S, Murugan D. Inner interruption discovery and defense system by using data mining, Journal of King Saud University - Computer and Information Sciences. 2020;32(5):592-59.
Yaping Li, Minghua Chen, Qiwei Li, Wei Zhang. Enabling multilevel trust in privacy preserving data mining, IEEE Transaction on knowledge and data Engineering. 2012;24(9).
Ajmeera kiren , Vasumathi D. Data Mining: Random Swapping based Data Perturbation Technique for Privacy Preserving in Data Mining, International Journal of Recent Technology and Engineering. 2019;8(1S4): 764-777.
Mahalle VS, Pankaj Jogi. Data privacy preserving using perturbation technique, Asian Journal of Convergence In technology. 2017;3(3) .
Devang J Patel, Swati Patel. A survey on data perturbation techniques for privacy preserving in data mining, International Journal for Scientific Research & Development. 2015; 1(3):52-54.