Hiding Techniques for Data Publishing by Conserving Item hiding and Privacy Conserving

Vol-4 | Issue-03 | March 2019 | Published Online: 13 March 2019    PDF ( 436 KB )
Author(s)
Shipra Varshney 1

1Research Scholar, Department of Information Technology, GGISP University/ Dr. Akhilesh Das Gupta Institute of Technology & Management (Formerly Northern India Engineering College) NEW DELHI-110053, India

Abstract

We lives in a world are live in a world where vast amounts of data are collected daily. Analyzing such data is an important need. Data mining is a current technology for extracting knowledge from a large amount of data. In real world business applications Data mining plays a major role by providing disparate techniques and algorithms. Privacy preserving is an important research area, which allows parties to cooperate in the knowledge extraction without revealing the extracted knowledge with any individual parties. Once the information is pooled among dissimilar nodes such that centralized or distributed, then data mining out-comes and results should guarantee the secret sharing of information. This paper presents and proposes performance analysis for the proposed OSA-SIH, SIPRP AND RSA-DSO methods and expands on the original data set. In the paper the techniques based on the evaluated dataset, augmented and optimal hiding of sensitive item is appeared and even for large item sets, ensuring time for optimal hiding. The findings of the techniques discussed in this paper demonstrated that the proposed techniques out performed than the already alive state of the art works in understanding of privacy preservation accuracy, time for optimal data hiding and degree of side effects on modified dataset as related to the state of the art works.

Keywords
Perturbation, OSA-SIH, SIPRP, RSA-DSO, Privacy Preserving Data Mining, Sensitive Item Hiding
Statistics
Article View: 288