A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rajalakshmi, V.
- Anonymization by Data Relocation Using Sub-clustering for Privacy Preserving Data Mining
Authors
1 Sathyabama University, Chennai, Tamil Nadu, IN
2 Department of Computer Science and Engineering, St. Joseph’s College of Engineering, Chennai, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 7, No 7 (2014), Pagination: 975-980Abstract
As there are new techniques growing to reveal the hidden information on data, the threat towards those data also increases. Therefore, privacy preservation in data mining is an emerging research area which develops various algorithms to anonymize the data provided for data mining. The existing methodology handles the tradeoff between utility and privacy of data in a more expensive way in terms of execution time. In this paper, a simple Anonymization technique using subclustering is specified which achieves maximum privacy and also utility with minimum execution time. The methodology is explained with algorithm and the results are compared with the baseline method.Keywords
Anonymization, Clustering, Isometric Transformation, Privacy Preservation- Reconstruction Based Privacy Preservation in Centralized Incremental Data Mining
Authors
1 Sathyabama University, Chennai, IN
2 St. Joseph's College of Engineering, Chennai, IN
Source
Data Mining and Knowledge Engineering, Vol 4, No 8 (2012), Pagination: 424-427Abstract
The technological development has led the storage of data efficiently in terms of both storage and cost. This huge amount of data can be used for research to reveal the hidden information for betterment of life. Since the data may hinder the privacy of individual, there is an emerging research area going on towards privacy preservation of data. When many are concentrating on static data, this is a work developed solely for incremental data where in the database gets updated frequently. The method groups the data into various classes and the encryption is based on the key values generated within each class. Since the key is not a constant private or public key, the method provides a greater amount of protection compared to usual cryptographic techniques. In this paper RPPCID, the algorithm is specified with a sample input and output database. The method does not require the execution of entire database after insertion. The method is a combination of cryptography and perturbation methodology and hence has the advantages of both. The performance of the methodology is also expressed using a graph.Keywords
Privacy Preservation, Encryption, Incremental Data, Privacy Attacks, Sequential Data Collection.- An Estimation of Privacy in Incremental Data Mining
Authors
1 Department of Information Technology, Sathyabama University, Chennai, IN
2 Department of Computer Science and Engineering, St. Joseph’s College of Engineering, Chennai, IN
3 Tata Consultancy Services, Chennai, IN
Source
Data Mining and Knowledge Engineering, Vol 2, No 4 (2010), Pagination:Abstract
Data are values of qualitative or quantitative variables, belonging to a set of items. In recent years, advances in hardware technology have lead to an increase in the capability to store and record personal data about consumers and individuals. This has lead to concerns that the personal data may be misused for a variety of purposes. Data explains a business transaction, a medical record, bank details, educational details etc., Use of technology for data collection and analysis has seen an unprecedented growth in the last couple of decades. Such information includes private details, which the owner doesn’t want to disclose. Such data are the sources for data mining. Data mining gives us “facts” that are not obvious to human analysts of the data. When such sensitive data are given directly for mining, the security of the individual is highly affected. So the data are modified and presented for data mining. But the problem is that the altered data should also produce a similar mining result. This has lead an area called privacy preservation in datamining which is an intersection of data mining and information security. The fact in this area is the additional task which is used to implement the privacy degrades the performance of the data mining algorithm, which results in incorrect mining results. This crucial situation has led to the development of this paper which deals with the data metrics that determines the quality of the following existing privacy preserving algorithms viz., Correlation- aware Anonymization of High-dimensional Data (CAHD) [1], Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion (PRND) [2], Privacy-Preserving Data Aggregation(PPDA) [3], Privacy-Preserving Incremental Data sets( PRID) [4] which defines various methods for implementing privacy in incremental data. Major metrics like data utility, privacy and computational time are considered for evaluation and their detailed performance is discussed.
Keywords
Datamining, Privacy Preservation, Perturbation, Quality Metrics, Anonymization.- Connecting Health Seekers and Health Care Knowledge Portal by a Semantic Approach
Authors
1 Department of Information Technology, Sathyabama University, Rajiv Gandhi Road, Jeppiaar Nagar, Chennai - 600119, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 10 (2016), Pagination:Abstract
Objectives: To bridge the vocabulary gap between health seekers and providers to provide believable and accurate solutions to the health seekers for patients to solve issues over medical assistance records. Method: The proposed scheme consists of two mutually reinforced components, namely, local mining and global learning. The local mining technique is using some of the particular medical records for explaining the overall benefit and conclusion regarding particular health mapping by authentication terminology. The database of local Mining is getting update through the data of global learning, which collects the related medical data. This attempt is a particular pair of Q&A independently over the concept of medical extraction from pairing it through Q&A and maps it through the terminologies of authentication. Findings: In this research work a novel scheme is proposed which will be able to code the medical records with corpus-aware terminologies. As the first of its kind on automatically coding the community generated health data using concept entropy impurity approach to comparatively detect and normalize the medical concepts locally, which naturally construct a corpus-aware terminology vocabulary with the help of external knowledge. Also it builds a novel global learning model to collaboratively enhance the local coding results. This model seamlessly integrates various heterogeneous information cues. For making a communication or connection between the gaps, it is being described over here about the label of Question and Answer by joining and utilizing the approaches of global learning and local mining. Applications: The procedure can be used to build an efficient web portal for health seekers. The effectiveness of the system is being increased by experts question and answeringKeywords
Corpus Aware Terminology, Global Learning, Health Care, Health Seekers, Local Mining, Semantic Approach- Artificial Instructions for Human Brain
Authors
1 Department of MCA, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600 062, Tamil Nadu, IN