Abstract
The advancement and introduction of computing technologies has proven to be highly effective and has resulted in the production of large amount of data that is to be analyzed. However, there is much concern on the privacy protection of the gathered data which suffers from the possibility of being exploited or exposed to the public. Hence, there are many methods of preserving this information they are not completely scalable or efficient and also have issues with privacy or data utility. Hence this proposed work provides a solution for such issues with an effective perturbation algorithm that uses big data by means of optimal geometric transformation. The proposed work has been examined and tested for accuracy, attack resistance, scalability and efficiency with the help of 5 classification algorithms and 9 datasets. Experimental analysis indicates that the proposed work is more successful in terms of attack resistance, scalability, execution speed and accuracy when compared with other algorithms that are used for privacy preservation.
References
- Shynu, P. G., Shayan, H. M., & Chowdhary, C. L. (2020, February). A fuzzy based data perturbation technique for privacy preserved data mining. In 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE) (pp. 1-4). IEEE.
- Kargupta, H., Datta, S., Wang, Q., & Sivakumar, K. (2005). Random-data perturbation techniques and privacy-preserving data mining. Knowledge and Information Systems, 7(4), 387-414.
- Shirley, D. R. A., Ranjani, K., Arunachalam, G., & Janeera, D. A. (2021). Automatic Distributed Gardening System Using Object Recognition and Visual Servoing. In Inventive Communication and Computational Technologies (pp. 359-369). Springer, Singapore.
- Kargupta, H., Datta, S., Wang, Q., & Sivakumar, K. (2003, November). On the privacy preserving properties of random data perturbation techniques. In Third IEEE international conference on data mining (pp. 99-106). IEEE.
- Anand, J. V. (2020). A Methodology of Atmospheric Deterioration Forecasting and Evaluation through Data Mining and Business Intelligence. Journal of Ubiquitous Computing and Communication Technologies (UCCT), 2(02), 79-87.
- Chen, K., & Liu, L. (2011). Geometric data perturbation for privacy preserving outsourced data mining. Knowledge and information systems, 29(3), 657-695.
- Li, J. Y., Zhan, Z. H., Wang, H., & Zhang, J. (2020). Data-driven evolutionary algorithm with perturbation-based ensemble surrogates. IEEE Transactions on Cybernetics.
- Kanth, P. C., & Anbarasi, M. S. (2020). A generic framework for data analysis in privacy-preserving data mining. In Computational Intelligence in Data Mining (pp. 653-661). Springer, Singapore.
- Kataka, E., Zaucha, J., Frishman, G., Ruepp, A., & Frishman, D. (2020). Edgetic perturbation signatures represent known and novel cancer biomarkers. Scientific reports, 10(1), 1-16.
- García, J., Lalla-Ruiz, E., Voss, S., & Droguett, E. L. (2020). Enhancing a machine learning binarization framework by perturbation operators: analysis on the multidimensional knapsack problem. International Journal of Machine Learning and Cybernetics, 1-20.
- Feyisetan, O., Balle, B., Drake, T., & Diethe, T. (2020, January). Privacy-and utility-preserving textual analysis via calibrated multivariate perturbations. In Proceedings of the 13th International Conference on Web Search and Data Mining (pp. 178-186).
- Suma, V., & Hills, S. M. (2020). Data Mining based Prediction of Demand in Indian Market for Refurbished Electronics. Journal of Soft Computing Paradigm (JSCP), 2(03), 153-159.
- Shakya, S. (2020). Process mining error detection for securing the IoT system. Journal of ISMAC, 2(03), 147-153.
