Privacy Preserving Clustering Based on Fuzzy Data Transformation Methods
نویسندگان
چکیده
Knowledge extraction process poses certain problems like accessing sensitive, personal or business information. Privacy invasion occurs owing to the abuse of personal information. Hence privacy issues are challenging concern of the data miners. Privacy preservation is a complex task as it ensures the privacy of individuals without losing the accuracy of data mining results. In this paper, fuzzy based data transformation methods are proposed for privacy preserving clustering in centralized database environment. In case one, a fuzzy data transformation method is proposed and various experiments are conducted by varying the fuzzy membership functions such as Z-shaped fuzzy membership function, Triangular fuzzy membership function, Gaussian fuzzy membership function to transform the original dataset. In case two, a hybrid method is proposed as a combination of fuzzy data transformation approach specified in case one and Random Rotation Perturbation (RRP). The experimental results proved that the proposed hybrid method yields good results for all the member functions which are used in case one.
منابع مشابه
A Privacy Preserving Clustering Method Based on Fuzzy Approach and Random Rotation Perturbation
Individual privacy issues arise in these days when organizations using clustering as a data analysis tool. Private and sensitive data available in criminal, healthcare and financial records need to be preserved and also avoid the privacy leakage with the data mining system. In this paper, a privacy preserving clustering method is proposed for protecting the underlying sensitive attribute values...
متن کاملRevisiting "Privacy Preserving Clustering by Data Transformation"
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The challenge is how to protect the underlying data values subjected to clustering without jeopardizing the similarity between objects under analysis. In this short paper, we revisit a family of geometric data transformation methods (GDTMs) that distort numerical attributes by translations, scalings,...
متن کاملSVD based Data Transformation Methods for Privacy Preserving Clustering
Nowadays privacy issues are major concern for many government and other private organizations to delve important information from large repositories of data. Privacy preserving clustering which is one of the techniques emerged to addresses the problem of extracting useful clustering patterns from distorted data without accessing the original data directly. In this paper two hybrid data transfor...
متن کاملPrivacy Preserving Based on PCA Transformation Using Data Perturbation Technique
Maintain confidentiality, privacy and security research in data mining (PPDM) is one of the biggest trends. Recent advances in data collection, data dissemination and related technologies have inaugurated a new era of research where existing data mining algorithms should be reconsidered from a different point of view, this of privacy preservation. We propose a simple PCA based transformation ap...
متن کاملPrivacy Preserving Clustering by Data Transformation
Despite its benefit in a wide range of applications, data mining techniques also have raised a number of ethical issues. Some such issues include those of privacy, data security, intellectual property rights, and many others. In this paper, we address the privacy problem against unauthorized secondary use of information. To do so, we introduce a family of geometric data transformation methods (...
متن کامل