Open Access Open Access  Restricted Access Subscription Access

Anonymization by Data Relocation Using Sub-clustering for Privacy Preserving Data Mining


Affiliations
1 Sathyabama University, Chennai, Tamil Nadu, India
2 Department of Computer Science and Engineering, St. Joseph’s College of Engineering, Chennai, Tamil Nadu, India
 

As there are new techniques growing to reveal the hidden information on data, the threat towards those data also increases. Therefore, privacy preservation in data mining is an emerging research area which develops various algorithms to anonymize the data provided for data mining. The existing methodology handles the tradeoff between utility and privacy of data in a more expensive way in terms of execution time. In this paper, a simple Anonymization technique using subclustering is specified which achieves maximum privacy and also utility with minimum execution time. The methodology is explained with algorithm and the results are compared with the baseline method.

Keywords

Anonymization, Clustering, Isometric Transformation, Privacy Preservation
User

Abstract Views: 253

PDF Views: 0




  • Anonymization by Data Relocation Using Sub-clustering for Privacy Preserving Data Mining

Abstract Views: 253  |  PDF Views: 0

Authors

V. Rajalakshmi
Sathyabama University, Chennai, Tamil Nadu, India
G. S. Anandha Mala
Department of Computer Science and Engineering, St. Joseph’s College of Engineering, Chennai, Tamil Nadu, India

Abstract


As there are new techniques growing to reveal the hidden information on data, the threat towards those data also increases. Therefore, privacy preservation in data mining is an emerging research area which develops various algorithms to anonymize the data provided for data mining. The existing methodology handles the tradeoff between utility and privacy of data in a more expensive way in terms of execution time. In this paper, a simple Anonymization technique using subclustering is specified which achieves maximum privacy and also utility with minimum execution time. The methodology is explained with algorithm and the results are compared with the baseline method.

Keywords


Anonymization, Clustering, Isometric Transformation, Privacy Preservation



DOI: https://doi.org/10.17485/ijst%2F2014%2Fv7i7%2F54315