Comparative study on perturbation techniques in privacy preserving data mining
Data Mining is a computational process that able to identify patterns, trends and behaviour from large datasets. With this advantages, data mining has been applied in many fields such as finance, healthcare, retail and so on. However, information disclosure become one of an issue during data mining...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
Penerbit UTM Press
2018
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/82065/ http://dx.doi.org/10.11113/ijic.v8n1.161 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.82065 |
---|---|
record_format |
eprints |
spelling |
my.utm.820652019-10-23T08:40:20Z http://eprints.utm.my/id/eprint/82065/ Comparative study on perturbation techniques in privacy preserving data mining Ko, Desmond Khang Siang Othman, Siti Hajar Raja Mohd. Radzi, Raja Zahilah QA75 Electronic computers. Computer science Data Mining is a computational process that able to identify patterns, trends and behaviour from large datasets. With this advantages, data mining has been applied in many fields such as finance, healthcare, retail and so on. However, information disclosure become one of an issue during data mining process. Therefore, privacy protection is needed during data mining process which known as Privacy Preserving Data Mining (PPDM). There are several techniques available in PPDM and each of the techniques has its’ own benefits and drawbacks. In this research, perturbation technique is selected as privacy preserving technique. Perturbation technique is a method that alters the original data value before the application of data mining. In PPDM applications, perturbation technique able to provide a protection of data privacy but the accuracy of data should not be ignored too. In this research, three perturbation techniques are selected which are additive noise, data swapping and resample. For data mining techniques, two methods of classification are selected which are Naïve Bayes and Support Vector Machines (SVM). With the selection of these techniques, the experimental results are evaluated based on the hiding failure, accuracy and precision. For overall result, resample is selected as the best perturbation technique in naïve bayes and SVM classification for both glass and ionosphere datasets. Penerbit UTM Press 2018 Article PeerReviewed Ko, Desmond Khang Siang and Othman, Siti Hajar and Raja Mohd. Radzi, Raja Zahilah (2018) Comparative study on perturbation techniques in privacy preserving data mining. International Journal Of Innovative Computing, 8 (1). pp. 27-32. ISSN 2180-4370 http://dx.doi.org/10.11113/ijic.v8n1.161 DOI:10.11113/ijic.v8n1.161 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Ko, Desmond Khang Siang Othman, Siti Hajar Raja Mohd. Radzi, Raja Zahilah Comparative study on perturbation techniques in privacy preserving data mining |
description |
Data Mining is a computational process that able to identify patterns, trends and behaviour from large datasets. With this advantages, data mining has been applied in many fields such as finance, healthcare, retail and so on. However, information disclosure become one of an issue during data mining process. Therefore, privacy protection is needed during data mining process which known as Privacy Preserving Data Mining (PPDM). There are several techniques available in PPDM and each of the techniques has its’ own benefits and drawbacks. In this research, perturbation technique is selected as privacy preserving technique. Perturbation technique is a method that alters the original data value before the application of data mining. In PPDM applications, perturbation technique able to provide a protection of data privacy but the accuracy of data should not be ignored too. In this research, three perturbation techniques are selected which are additive noise, data swapping and resample. For data mining techniques, two methods of classification are selected which are Naïve Bayes and Support Vector Machines (SVM). With the selection of these techniques, the experimental results are evaluated based on the hiding failure, accuracy and precision. For overall result, resample is selected as the best perturbation technique in naïve bayes and SVM classification for both glass and ionosphere datasets. |
format |
Article |
author |
Ko, Desmond Khang Siang Othman, Siti Hajar Raja Mohd. Radzi, Raja Zahilah |
author_facet |
Ko, Desmond Khang Siang Othman, Siti Hajar Raja Mohd. Radzi, Raja Zahilah |
author_sort |
Ko, Desmond Khang Siang |
title |
Comparative study on perturbation techniques in privacy preserving data mining |
title_short |
Comparative study on perturbation techniques in privacy preserving data mining |
title_full |
Comparative study on perturbation techniques in privacy preserving data mining |
title_fullStr |
Comparative study on perturbation techniques in privacy preserving data mining |
title_full_unstemmed |
Comparative study on perturbation techniques in privacy preserving data mining |
title_sort |
comparative study on perturbation techniques in privacy preserving data mining |
publisher |
Penerbit UTM Press |
publishDate |
2018 |
url |
http://eprints.utm.my/id/eprint/82065/ http://dx.doi.org/10.11113/ijic.v8n1.161 |
_version_ |
1651866601497034752 |
score |
13.212156 |