DocumentCode :
3124017
Title :
Multi-level and multi-key trust in PPDM
Author :
Sriharsha, A.V. ; Parthasarathy, C.
Author_Institution :
Dept. of CSE, Sree Vidyanikethan Eng. Coll., Tirupati, India
fYear :
2013
fDate :
4-6 July 2013
Firstpage :
1
Lastpage :
5
Abstract :
Privacy in data for data mining is ensured by many methods since decades. Data Transformation in the KDD process ensures transforming the data into cryptic codes and some abbreviated forms, yet the details of the data are guessable to the data miners. Perturbation theory comprises mathematical methods that are used to find an approximate solution to a problem which cannot be solved exactly, by starting from the exact solution of a related problem. Perturbation function causes a minor or major change in the result of the problem-solution scenario to get the expected yield mathematically. The concern over privacy of personal and sensitive information has led to the implementation of several techniques for hiding, obfuscating and encrypting sensitive information in databases. The requirement of preserving privacy as well as the usability of sensitive data has led to development of nearest neighborhood techniques. In this work we propose a method that expands the scope of perturbation in PPDM as multilevel and multikey trust in privacy preserving data mining. An analogical approach with measuring the identification attacks, diversity attacks and the problem is addresses the challenge by properly correlating perturbation across copies of different trust levels and keys that are pertaining to the sub domain contexts of the databases. Our proposed framework is architecturally robust and defends the attacks to achieve the privacy goal. Our framework supports data providers to deliver different forms of data with different privacy levels based on the market demand. Data owners can relax with the framework provided in this paper.
Keywords :
codes; cryptography; data encapsulation; data mining; data privacy; trusted computing; KDD process; PPDM; cryptic codes; data mining; data privacy; data transformation; databases; mathematical methods; multikey trust; multilevel trust; nearest neighborhood techniques; perturbation theory; privacy preservation; problem-solution scenario; sensitive information encryption; sensitive information hiding; sensitive information obfuscating; Cryptography; Data models; Data privacy; Educational institutions; Privacy; multi-key perturbation; multi-level trust; perturbation; privacy preserving data mining;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location :
Tiruchengode
Print_ISBN :
978-1-4799-3925-1
Type :
conf
DOI :
10.1109/ICCCNT.2013.6726637
Filename :
6726637
Link To Document :
بازگشت