651 Hits in 5.6 sec

Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms

Rajesh N., Sujatha K., A. Arul
2016 International Journal of Computer Applications  
In this survey paper, on current researches made on privacy preserving data mining technique with fuzzy logic, neural network learning, secured sum and various encryption algorithm is presented.  ...  This will enable to grasp the various challenges faced in privacy preserving data mining and also help us to find best suitable technique for various data environment.  ...  This paper express a complete detailed survey on recent algorithms which are proposed for achieving a privacy preserving data mining using fuzzy logic, Neural networks, and other asymmetric encryption  ... 
doi:10.5120/ijca2016907917 fatcat:5rl3whokrrhijjdapggjrsilxu

Securing Informative Fuzzy Association Rules using Bayesian Network

Muhammad Fahad, Khalid Iqbal, Somaiya Khatoon, Khalid Mahmood
2019 International Journal of Advanced Computer Science and Applications  
Privacy preservation is used for valuable information extraction and minimizing the risk of sensitive information disclosure.  ...  Privacy preservation of maximum number of sensitive FARs by keeping minimum perturbation highlights the significance of our model.  ...  A Bayesian network-based model has been used as well in privacy preservation [23] .  ... 
doi:10.14569/ijacsa.2019.0101068 fatcat:dfe6wecbnjcglgrxl7r2lomiei

PPaaS: Privacy Preservation as a Service [article]

Pathum Chamikara Mahawaga Arachchige, Peter Bertok, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe
2020 arXiv   pre-print
It enhances the usability of privacy-preserving methods within its pool; it is a generic platform that can be used to sanitize big data in a granular, application-specific manner by employing a suitable  ...  The proposed method employs selective privacy preservation via data perturbation and looks at different dynamics that can influence the quality of the privacy preservation of a dataset.  ...  The privacy preservation module consists of pools of application logic (e.g. classification and association mining), and pools of privacy preservation algorithms (e.g. matrix multiplication, additive perturbation  ... 
arXiv:2007.02013v2 fatcat:3dwye765zrar7mwgg7xhhdebbu

Privacy Preserving Fuzzy Based Decision Tree Classifier

N. G. Nageswari Amma, F. Ramesh Dhanaseelan
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Fuzzy logic is used to preserve the privacy in the system and decision tree is used for classification.  ...  In this paper, the advantages of fuzzy logic and decision tree are used to build the privacy preserving classifier.  ...  In this paper, fuzzy logic is used in order to preserve the privacy and decision tree is used to extract the rules and to classify the data. II.  ... 
doi:10.23956/ijarcsse/v6i12/0200 fatcat:eup35korrfgizlglv74ggaeshm

Clustering based Privacy Preserving of Big Data using Fuzzification and Anonymization Operation

Saira Khan, Khalid Iqbal, Safi Faizullah, Muhammad Fahad, Jawad Ali, Waqas Ahmed
2019 International Journal of Advanced Computer Science and Applications  
Clustering based Privacy preservation of individual data in big data with minimum perturbation and successful reconstruction highlights the significance of our model in addition to the use of standard  ...  The existing privacy preserving methods use different algorithms that results into limitation of data reconstruction while securing the sensitive data.  ...  Al [11] used min-max normalization, fuzzy logic, rail fence and map range to preserve the privacy of individual by masking the sensitive attributes.  ... 
doi:10.14569/ijacsa.2019.0101239 fatcat:nnikj5mxt5hwng4tnkstbroney

An Improved Rotation-Based Privacy Preserving Classification in Web Mining Using Naïve Bayes Classifier

2020 Studies in Informatics and Control  
data renovation and classification on perturbed data is done using Naïve Bayes classifier.  ...  The classifier is improved by using a holdout approach on data separation in training and testing phases.  ...  Here the first phase of data perturbation is done by grouping the data using a fuzzy approach and this fuzzy logic is used to perform clustering on large volume data.  ... 
doi:10.24846/v30i4y202004 fatcat:bth7sdt6rjg2tigp7xboclec2e

A Hybrid Clustering Approach and Random Rotation Perturbation (RRP) for Privacy Preserving Data Mining

Sivakumar Kaliappan, Sathyabama Institute of Science and Technology
2018 International Journal of Intelligent Engineering and Systems  
As privacy preserving data mining grants, sharing and exchanging of privacy susceptible data for analysis, it has exploited increasingly popular.  ...  The Privacy Preserving Data Mining (PPDM) is known to be the most critical perspective among analysts.  ...  Random rotation perturbation for privacy preserving Data perturbation is an imperative system for privacy-preserving the data.  ... 
doi:10.22266/ijies2018.1231.17 fatcat:l3h22vrlffelxfltd6nlyky3ly

Privacy Preserving Data Mining: Techniques, Classification and Implications - A Survey

Alpa Shah, Ravi Gulati
2016 International Journal of Computer Applications  
The main categorization of Privacy Preserving Data Mining (PPDM) techniques falls into Perturbation, Secure Sum Computations and Cryptographic based techniques.  ...  Privacy has become crucial in knowledge based applications. Proper integration of individual privacy is essential for data mining operations.  ...  A technique k-means clustering for anonymizing using Fuzzy logic is proposed in [54] . The record in cluster k is anonymized to make it indistinguishable from remaining k-1 clusters.  ... 
doi:10.5120/ijca2016909006 fatcat:k37zgytczbh6pjpse3wqu2inva

Privacy Preserving in Data Mining using Bi-party Data Releasing Method

K. Noel Binny, Nisha Varghese
2018 IJARCCE  
In this topic the privacy preserving in Data mining works with Bi-Party Data Release Method.  ...  The exponential mechanism chooses a candidate that is close to optimum with respect to a utility function while preserving differential privacy.  ...  In this concept, new big data association rule hiding technique is presented, which uses fuzzy logic approach.  ... 
doi:10.17148/ijarcce.2018.71017 fatcat:4otcuxevlrewpfdh3cag4ejq2a

Fuzzy Framework for Preserving Privacy in Neural Networks Classification

Majid Bashir, M. Asger, Rashid Ali, Tasleem Arif
2016 International Journal of Computer Applications  
has been preserved as in the absence of integrated privacy constraints.  ...  In this paper, a methodology has been developed to resolve the privacy issue by integrating fuzzy logic in the process of NN classification and at the same time the accuracy of the results of the NN classification  ...  Genetic algorithms, Neural networks, Rough sets, and Fuzzy logic are some of the most widely used soft computing techniques. Fuzzy sets specialize in dealing with uncertainty [9] [10] .  ... 
doi:10.5120/ijca2016910290 fatcat:y6cvcorlhzdsxa6sxnzn743ake

FSSPCM: Fuzzy Publication of Data for Privacy Preserving

Yan Yan, Xiaohong Hao, Wanjun Wang
2016 International Journal of Security and Its Applications  
The paper proposed a transformation algorithm for privacy preserving data publishing based on fuzzy semantic set pair cloud model (FSSPCM).  ...  K-anonymity method is the most widely used privacy protection model and has been well researched.  ...  Privacy Preserving Data Publication based on Fuzzy Semantic Set Pair Cloud Model Numerical data is the most common and important form in data publishing.  ... 
doi:10.14257/ijsia.2016.10.11.20 fatcat:3ld4tl25abcljlidnunz2owsne

Preserving Privacy and Optimizing Neural Network Classification by using a Mix of Soft Computing Techniques

Majid Bashir, M. Asger, Rashid Ali, Tasleem Arif
2016 International Journal of Computer Applications  
Data mining in general and NNs in particular are being used in various areas where privacy of individuals is at stake.  ...  An Artificial Neural Network (ANN) commonly called as Neural Network (NN) is a mathematical tool that is used in data mining for the analysis of data.  ...  The most widely used soft computing techniques in developing data mining solutions are Neural Networks, Rough Sets, Genetic Algorithms and Fuzzy logic [2] .  ... 
doi:10.5120/ijca2016911188 fatcat:kuqxk77u7bdtbm5v2zkd5djxly

Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure

B. B. Gupta, Shingo Yamaguchi, Zhiyong Zhang, Konstantinos E. Psannis
2018 Multimedia tools and applications  
Therefore, the papers of this special issue address variety of security and privacy challenges and developments in multimedia big data in critical infrastructure from the perspective of providing security  ...  Specially, security and privacy of multimedia big data in the critical infrastructure (a nation's strategic national assets, i.e. banking and finance, communications, emergency services, energy, food chain  ...  perturbation algorithm to preserve privacy for social network was proposed considering preservation privacy of vertices properties and community structures simultaneously.  ... 
doi:10.1007/s11042-018-6426-2 fatcat:jfuzcmb62fh3vajha3vdttj4km

On Differential Privacy-Based Framework for Enhancing User Data Privacy in Mobile Edge Computing Environment

Jhilakshi Sharma, Donghyun Kim, Ahyoung Lee, Daehee Seo
2021 IEEE Access  
To address the problem, this paper proposes DP-FCNN, that implements Differential Privacy using a Fuzzy Convolution Neural Network (FCNN) with Laplace Mechanism for injecting noise.  ...  INDEX TERMS Differential privacy, fuzzy, convolution neural network, Merkle hash tree.  ...  This fuzzification leads to data perturbation which in turn preserves privacy of the original data.  ... 
doi:10.1109/access.2021.3063603 fatcat:7xtdjndignb5ddk5rmftj4uhdq

Opposition Intensity-Based Cuckoo Search Algorithm for Data Privacy Preservation

G.K. Shailaja, C.V. Guru Rao
2019 Journal of Intelligent Systems  
Privacy-preserving data mining (PPDM) is a novel approach that has emerged in the market to take care of privacy issues.  ...  The conventional works include numerous techniques, most of which employ some form of transformation on the original data to guarantee privacy preservation.  ...  In 2016, Komishani et al. [12] adopted a scheme known as preserving privacy in trajectory data (PPTD), a new methodology for data preservation depending on the perception of privacy.  ... 
doi:10.1515/jisys-2018-0420 fatcat:vaadqyf2azeylfexczskqmf7si
« Previous Showing results 1 — 15 out of 651 results