Open Access Open Access  Restricted Access Subscription Access

Enhancing Privacy Preservation in Data Mining using Cluster based Greedy Method in Hierarchical Approach


Affiliations
1 Department of Information Technology, Vel Tech University, Chennai - 600062, Tamil Nadu, India
 

Background/Objectives: Privacy preservation in data mining to hold back the sensitive data from attackers. Findings: There are various existing methods available to preserve the data like perturbation, anonymization, randomization etc., each method has its own advantages and disadvantages. The trade-off between security and utility of data should be handled with standardizing methods for the PPDM. In this paper explained a method based on PPDM in data mining using cluster based greedy method. Application/Improvements: This method can be applied in sensitive data areas such as hospitals, Customer Management System, government survey, etc., where there is need for privacy preservation.

Keywords

Cluster based Greedy Method, Classification Error, Isometric Transformation, Privacy Preservation, Privacy Preservation Rate
User

Abstract Views: 147

PDF Views: 0




  • Enhancing Privacy Preservation in Data Mining using Cluster based Greedy Method in Hierarchical Approach

Abstract Views: 147  |  PDF Views: 0

Authors

R. Hariharan
Department of Information Technology, Vel Tech University, Chennai - 600062, Tamil Nadu, India
C. Mahesh
Department of Information Technology, Vel Tech University, Chennai - 600062, Tamil Nadu, India
P. Prasenna
Department of Information Technology, Vel Tech University, Chennai - 600062, Tamil Nadu, India
R. Vinoth Kumar
Department of Information Technology, Vel Tech University, Chennai - 600062, Tamil Nadu, India

Abstract


Background/Objectives: Privacy preservation in data mining to hold back the sensitive data from attackers. Findings: There are various existing methods available to preserve the data like perturbation, anonymization, randomization etc., each method has its own advantages and disadvantages. The trade-off between security and utility of data should be handled with standardizing methods for the PPDM. In this paper explained a method based on PPDM in data mining using cluster based greedy method. Application/Improvements: This method can be applied in sensitive data areas such as hospitals, Customer Management System, government survey, etc., where there is need for privacy preservation.

Keywords


Cluster based Greedy Method, Classification Error, Isometric Transformation, Privacy Preservation, Privacy Preservation Rate



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i3%2F130269