Downloads: 112 | Views: 270
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016 | Popularity: 6.5 / 10
Privacy-Preserving in Data Mining using Anonymity Algorithm for Relational Data
Karan Dave, Chetna Chand
Abstract: Data mining is the process of analyzing data from different perspectives. To summarize it into useful information, we can consider several algorithms. To protect data from unauthorized user in this case is a problem to solve. Access control mechanisms protect sensitive information from unauthorized users. But if the privacy protected information is not in proper format, again the user will compromise the privacy and quality of data. A privacy protection mechanism can use suppression and generalization of relational data to anonymize and satisfy privacy requirements, e. g. , k-anonymity and l-diversity, against identity and attribute disclosure. However, privacy is achieved at the cost of precision of authorized information. In this paper, we propose an accuracy-constrained privacy-preserving access control framework. The access control policies define selection predicates available to roles while the privacy requirement is to satisfy the k-anonymity or l-diversity. An additional constraint that needs to be satisfied by the PPM is the imprecision bound for each selection predicate. The techniques for workload-aware anonymization for selection predicates have been discussed in the literature. However, to the best of our knowledge, the problem of satisfying the accuracy constraints for multiple roles has not been studied before. In our formulation of the aforementioned problem, we propose heuristics for anonymization algorithms and show empirically that the proposed approach satisfies imprecision bounds for more permissions and has lower total imprecision than the current state of the art.
Keywords: Data mining, Data Integrity, Data privacy, Anonymization, K anonymity, L diversity
Edition: Volume 5 Issue 3, March 2016
Pages: 1694 - 1698
DOI: https://www.doi.org/10.21275/NOV162221
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1068 - 1070Predicting the Course Knowledge Level of Students using Data Mining Techniques
Thapaswini P S
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 947 - 949COVID-19 Prediction using Machine Learning Algorithms
Saily Suresh Patil
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 1840 - 1846Analysis of Placement for Electronics and Communication Engineering Students using Multiple Clustering
Dr. Dola Sanjay S
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 1036 - 1039An Investigation of the Applications of Artificial Intelligence and Other New Technologies in Smart Energy Infrastructure
Karan Chawla