Comparative study on perturbation techniques in privacy preserving data mining

Data Mining is a computational process that able to identify patterns, trends and behaviour from large datasets. With this advantages, data mining has been applied in many fields such as finance, healthcare, retail and so on. However, information disclosure become one of an issue during data mining...

Full description

Saved in:
Bibliographic Details
Main Authors: Ko, Desmond Khang Siang, Othman, Siti Hajar, Raja Mohd. Radzi, Raja Zahilah
Format: Article
Published: Penerbit UTM Press 2018
Subjects:
Online Access:http://eprints.utm.my/id/eprint/82065/
http://dx.doi.org/10.11113/ijic.v8n1.161
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.82065
record_format eprints
spelling my.utm.820652019-10-23T08:40:20Z http://eprints.utm.my/id/eprint/82065/ Comparative study on perturbation techniques in privacy preserving data mining Ko, Desmond Khang Siang Othman, Siti Hajar Raja Mohd. Radzi, Raja Zahilah QA75 Electronic computers. Computer science Data Mining is a computational process that able to identify patterns, trends and behaviour from large datasets. With this advantages, data mining has been applied in many fields such as finance, healthcare, retail and so on. However, information disclosure become one of an issue during data mining process. Therefore, privacy protection is needed during data mining process which known as Privacy Preserving Data Mining (PPDM). There are several techniques available in PPDM and each of the techniques has its’ own benefits and drawbacks. In this research, perturbation technique is selected as privacy preserving technique. Perturbation technique is a method that alters the original data value before the application of data mining. In PPDM applications, perturbation technique able to provide a protection of data privacy but the accuracy of data should not be ignored too. In this research, three perturbation techniques are selected which are additive noise, data swapping and resample. For data mining techniques, two methods of classification are selected which are Naïve Bayes and Support Vector Machines (SVM). With the selection of these techniques, the experimental results are evaluated based on the hiding failure, accuracy and precision. For overall result, resample is selected as the best perturbation technique in naïve bayes and SVM classification for both glass and ionosphere datasets. Penerbit UTM Press 2018 Article PeerReviewed Ko, Desmond Khang Siang and Othman, Siti Hajar and Raja Mohd. Radzi, Raja Zahilah (2018) Comparative study on perturbation techniques in privacy preserving data mining. International Journal Of Innovative Computing, 8 (1). pp. 27-32. ISSN 2180-4370 http://dx.doi.org/10.11113/ijic.v8n1.161 DOI:10.11113/ijic.v8n1.161
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Ko, Desmond Khang Siang
Othman, Siti Hajar
Raja Mohd. Radzi, Raja Zahilah
Comparative study on perturbation techniques in privacy preserving data mining
description Data Mining is a computational process that able to identify patterns, trends and behaviour from large datasets. With this advantages, data mining has been applied in many fields such as finance, healthcare, retail and so on. However, information disclosure become one of an issue during data mining process. Therefore, privacy protection is needed during data mining process which known as Privacy Preserving Data Mining (PPDM). There are several techniques available in PPDM and each of the techniques has its’ own benefits and drawbacks. In this research, perturbation technique is selected as privacy preserving technique. Perturbation technique is a method that alters the original data value before the application of data mining. In PPDM applications, perturbation technique able to provide a protection of data privacy but the accuracy of data should not be ignored too. In this research, three perturbation techniques are selected which are additive noise, data swapping and resample. For data mining techniques, two methods of classification are selected which are Naïve Bayes and Support Vector Machines (SVM). With the selection of these techniques, the experimental results are evaluated based on the hiding failure, accuracy and precision. For overall result, resample is selected as the best perturbation technique in naïve bayes and SVM classification for both glass and ionosphere datasets.
format Article
author Ko, Desmond Khang Siang
Othman, Siti Hajar
Raja Mohd. Radzi, Raja Zahilah
author_facet Ko, Desmond Khang Siang
Othman, Siti Hajar
Raja Mohd. Radzi, Raja Zahilah
author_sort Ko, Desmond Khang Siang
title Comparative study on perturbation techniques in privacy preserving data mining
title_short Comparative study on perturbation techniques in privacy preserving data mining
title_full Comparative study on perturbation techniques in privacy preserving data mining
title_fullStr Comparative study on perturbation techniques in privacy preserving data mining
title_full_unstemmed Comparative study on perturbation techniques in privacy preserving data mining
title_sort comparative study on perturbation techniques in privacy preserving data mining
publisher Penerbit UTM Press
publishDate 2018
url http://eprints.utm.my/id/eprint/82065/
http://dx.doi.org/10.11113/ijic.v8n1.161
_version_ 1651866601497034752
score 13.212156