Please use this identifier to cite or link to this item:
Title: Data transformation approaches for privacy preserving data mining
Researcher: Rajalaxmi R R
Guide(s): Natarajan, A.M.
Keywords: Data mining, privacy preserving, Utility Itemset, Frequent Itemset
Upload Date: 28-Nov-2013
University: Anna University
Completed Date: 
Abstract: Recent advances in data mining techniques facilitate to explore hidden knowledge from a large volume of data. When organizations share data for mining, they may restrict confidential information and knowledge to the other organizations. The existing studies have dealt with data transformation methods for numerical data to preserve privacy in clustering and also data sanitization approaches to hide sensitive patterns. It is essential to devise new data transformation methods for categorical data to preserve privacy in clustering. In this work, to begin with, sensitive categorical data protection in clustering is addressed. Two hybrid data transformation methods have been devised to transform the sensitive categorical data. Then, their effectiveness in privacy preservation and clustering accuracy are validated. It is found that scaling and rotation transformation method improves the privacy level and the translation and rotation transformation method provides better accuracy in clustering. Hiding sensitive association rules are implemented by concealing the frequent itemsets. Experimental results indicate that the use of item and transaction conflict ratio reduces the legitimate itemsets missed after sanitization. The work further focuses on sanitization approaches for privacy preservation of sensitive utility itemsets. The experimental results indicate that the item conflict degree improves results in terms of the legitimate itemsets lost. Privacy preservation of utility and frequent itemset is also considered and two data sanitization approaches have been developed. Based on the experimental results, it can be observed that the item conflict ratio based sanitization approach minimizes non-sensitive itemsets missed and modifications in the original database. To summarize, the research works devised data transformation approaches by which privacy was ensured while maintaining accuracy in data mining. newline newline newline
Pagination: xvi, 110
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File48.96 kBAdobe PDFView/Open
02_certificates.pdf884.19 kBAdobe PDFView/Open
03_abstract.pdf12.19 kBAdobe PDFView/Open
04_acknowledgement.pdf13.12 kBAdobe PDFView/Open
05_contents.pdf56.46 kBAdobe PDFView/Open
06_chapter 1.pdf40.16 kBAdobe PDFView/Open
07_chapter 2.pdf39.69 kBAdobe PDFView/Open
08_chapter 3.pdf79.15 kBAdobe PDFView/Open
09_chapter 4.pdf319.24 kBAdobe PDFView/Open
10_chapter 5.pdf296.56 kBAdobe PDFView/Open
11_chapter 6.pdf318.54 kBAdobe PDFView/Open
12_chapter 7.pdf17.4 kBAdobe PDFView/Open
13_references.pdf28.11 kBAdobe PDFView/Open
14_publications.pdf14.85 kBAdobe PDFView/Open
15_vitae.pdf11.15 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.