Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/17677
Title: | Development of transformation based privacy preservation methods for data mining |
Researcher: | Poovammal, E |
Guide(s): | Ponnavaikko, M |
Keywords: | Computer Science privacy preservation methods data mining |
Upload Date: | 11-Apr-2014 |
University: | SRM University |
Completed Date: | October, 2010 |
Abstract: | Data-mining is a task of discovering significant/salient patterns/rules/results from a set of large amount of data stored in databases, data warehouses or in other information repositories. Eventhough the focus on data-mining technology has been on the discovery of general patterns (not on any specific information regarding individuals) some data-mining applications may require access to individual s records having sensitive privacy data. Data containing structured information on individuals is referred to as micro-data. Abundance of recorded, personal information available in electronic form coupled with increasingly powerful data-mining tools, poses a threat to privacy and data security. The prime objective of this research is to find a solution to this problem. Eventhough, the identifying attributes are not published, some set of attributes in a released table (called quasi identifiers) may be linked with external data base leaking the sensitive data. To alleviate this problem, the so called K-anonymity and L-diversity principles and their improved versions have been used popularly in the earlier research works. But, all such methods suffer from proximity and divergence breach considerations. Also, the choice of generalization and diversity principles depends on the needs of underlying application, that is, application specific. Further, in such methods, if the level of privacy level is increased, information-loss also increases. And, these methods are successful only when the quasi-identifiers are explicitly identified with a surety of cent percent. Also, a set of organizations need to share their data so that datamining can be applied on the integrated data so as to get better rules/patterns/results. Normally, participating parties would like to accomplish mining tasks without disclosing sensitive information (in their databases) to other parties or to any third party. Various cryptographic techniques are used to preserve privacy of such collaborative data. |
Pagination: | 113p. |
URI: | http://hdl.handle.net/10603/17677 |
Appears in Departments: | Department of Computer Science Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 53.76 kB | Adobe PDF | View/Open |
02_declaration.pdf | 34.08 kB | Adobe PDF | View/Open | |
03_certificate.pdf | 36.4 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 41.39 kB | Adobe PDF | View/Open | |
05_abstract.pdf | 51.34 kB | Adobe PDF | View/Open | |
06_list of figures.pdf | 40.1 kB | Adobe PDF | View/Open | |
07_list of tables.pdf | 38.9 kB | Adobe PDF | View/Open | |
08_list of abbreviations.pdf | 35.62 kB | Adobe PDF | View/Open | |
09_contents.pdf | 42.65 kB | Adobe PDF | View/Open | |
10_chapter 1.pdf | 144.08 kB | Adobe PDF | View/Open | |
11_chapter 2.pdf | 49.41 kB | Adobe PDF | View/Open | |
12_chapter 3.pdf | 116.94 kB | Adobe PDF | View/Open | |
13_chapter 4.pdf | 114.87 kB | Adobe PDF | View/Open | |
14_chapter 5.pdf | 77.4 kB | Adobe PDF | View/Open | |
15_chapter 7.pdf | 48.27 kB | Adobe PDF | View/Open | |
16_chapter 8.pdf | 107.11 kB | Adobe PDF | View/Open | |
17_chapter 9.pdf | 53.88 kB | Adobe PDF | View/Open | |
18_references.pdf | 58.08 kB | Adobe PDF | View/Open | |
19_list of publications.pdf | 31.83 kB | Adobe PDF | View/Open | |
20_vitae.pdf | 25.66 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: