Skip to main content

Privacy Preserving Datamining Techniques with Data Security in Data Transformation

  • Conference paper
  • First Online:
Computer Communication, Networking and IoT

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 459))

  • 407 Accesses

Abstract

Data mining is the process of pattern recovery in multiple database fields. Big data is the great volume of data that is being processed in the environment of data mining. It is therefore impossible to use hand-held database management tools or typical data processing programme to collect data sets, so that data mining techniques have been deployed. An effective data transformation is a vital prerequisite for facilitating an efficient process for discovering information on a wider scale. I would want to mention that in present PPDM research, certain fundamental problems are not addressed. First of all, Privacy Preserving Data Mining (PPDM) does not have a standard terminology. Second, for the centralised database, most algorithms are developed. However, data are commonly stored in several sites in today’s global digital world. Third, many algorithms are focused on safeguarding the privacy of personal information, but do not focus on data mining results. There is no single approach to obtain data and to hide limitations. Fourth, each algorithm is specialised on data mining tasks primarily. No single strategy can work for any type of data clustering algorithm. Part of data privacy also is a crucial role in transforming data after data storage. These can be used as a guide to future PPDM research. Present research explores the privacy of data mining with various ways to approach the scope of new development approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 160.49
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 210.99
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Li D, Yu D (2014) Deep learning: methods and applications. Found Trends Signal Process, Now Publishers

    Google Scholar 

  2. Glauner PO (2015) Deep convolutional neural networks for smile recognition. arXiv preprint

    Google Scholar 

  3. Xiong M, Chen J, Wang Z, Liang C, Zheng Q, Han Z et al (2015) Deep feature representation via multiple stack auto-encoders. In: Advances in multimedia information processing—PCM 2015, Springer, pp 275–284

    Google Scholar 

  4. Olshausen BA (1996) Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature 381:607–609

    Article  Google Scholar 

  5. Gomes L (2014) Machine-learning maestro michael jordan on the delusions of big data and other huge engineering efforts. IEEE Spectr 20

    Google Scholar 

  6. Testolin A, Stoianov I, De Filippo De Grazia M, Zorzi M (2013) Deep unsupervised learning on a desktop PC: a primer for cognitive scientists. Front Psychol 4:10.3389

    Google Scholar 

  7. Swati K, Kumar S A comparative study of various data transformation techniques in data mining. Int J Sci Eng Technol 4(3):146–148, ISSN: 2277-1581

    Google Scholar 

  8. Gokulnath C, Priyan MK, Balan EV (2015) Preservation of privacy in data mining by using PCA based perturbation technique. In: 2015 International conference on smart technologies and management India, 6–8 May 2015, pp 202–206

    Google Scholar 

  9. Saritha K Sajimon Abraham big data challenges and issues: review on analytic techniques Indian Journal of Computer Science and Engineering (IJCSE)ISSN: 0976–5166 Vol. 8 No. 3 Jun-Jul 2017

    Google Scholar 

  10. Kiran A (2019) Data mining: random swapping based data perturbation technique for privacy preserving in data mining. Int J Recent Technol Eng (IJRTE) 8(1S4), ISSN: 2277-3878

    Google Scholar 

  11. Sharmila S, Vijayarani S (2017) Frequent item set mining and association rule generation using enhanced Apriori and enhanced Eclat algorithms. Int J Innov Res Comput Commun Eng 5(4)

    Google Scholar 

  12. Vijayarani S, Tamilarasi A (2010) Data transformation technique for protecting private information in privacy preserving data mining advanced computing. An Int J (ACIJ) 1(1)

    Google Scholar 

  13. Venkataramana S, Sekhar BVDS, Raju VS, Chakravarthy VVSSS, Srinivas G (2020) An experimental analysis of secure-energy trade-off using optimized routing protocol in modern-secure-WSN. EAI Endorsed Trans Scalable Inform Syst 7(26)

    Google Scholar 

  14. Kumar PK Novel framework for data transformation for yielding structured data in opinion mining. In: 2017 International conference on electrical, electronics, communication, computer and optimization techniques

    Google Scholar 

  15. Nethravathi NP, Rao PG CBTS: correlation based transformation strategy for privacy preserving data mining. In: IEEE transactions on knowledge and data engineering, vol 24, no 2, Feb 2012

    Google Scholar 

  16. Putri AW, Hira L (2016) Hybrid transformation in privacy-preserving data mining 978-1-5090-5671-2/16/©2016. IEEE

    Google Scholar 

  17. Yadav C, Wang S, Kumar M (2013) Algorithm and approaches to handle large Data-A Survey. IJCSN Int J Comput Sci Netw 2(3):2277–5420, ISSN (Online)

    Google Scholar 

  18. Fu Z A computational study of using genetic algorithms to develop intelligent decision trees 0-7803-6657-3/01/@Z0O O1. IEEE

    Google Scholar 

  19. Patil DV, Bichkar RS (2010) Multiple imputation of missing data with genetic algorithm based techniques. IJCA Special Issue on Evolutionary Comput Optim Tech ECOT

    Google Scholar 

  20. Zope AR, Vidhate A, Harale N (2013) Data mining approach in security information and event management. Int J Future Comput Commun 2(2)

    Google Scholar 

  21. Acharjya DP (2016) A survey on big data analytics: challenges, open research issues and tools. (IJACSA) Int J Adv Comput Sci Appl 7(2)

    Google Scholar 

  22. Saraireh S A secure data communication system using cryptography and steganography. Int J Comput Netw Commun (IJCNC) 5(3)

    Google Scholar 

  23. Akhil S, Uma K (2017) Survey on the challenges and issues on big data analytics. Int J Mech Eng Technol (IJMET) 8(12):138–149

    Google Scholar 

  24. Saidulu D (2017) Machine learning and statistical approaches for big data: issues, challenges and research directions. Int J Appl Eng Res 12(21):11691–11699, ISSN 0973-4562

    Google Scholar 

  25. Sivaram N, Ramar K (2010) Applicability of clustering and classification algorithms for recruitment data mining. Int J Comput Appl (0975–8887) 4(5)

    Google Scholar 

  26. Deshai N, Sekhar BVDS, Reddy PVGD, Chakravarthy VVSSS (2020) Processing real world datasets using big data Hadoop tools. J Sci Ind Res (JSIR) 79(7):631–635

    Google Scholar 

  27. Omana J, Monika S, Deepika B (2017) survey on efficiency of association rule mining techniques. Int J Comput Sci Mobile Comput 6(4):5–8

    Google Scholar 

  28. Karthikeyan T, Ravikumar N (2014) A survey on association rule mining. Int J Adv Res Comput Commun Eng 3(1)

    Google Scholar 

  29. Ying-hua L, Bing-ru Y, Dan-yang C, Nan M (2011) State-of-the-art in distributed privacy preserving data mining. In: IEEE 3rd international conference communication software and networks, pp 545–549

    Google Scholar 

  30. Mishra S, Mishra P (2014) A survey on association rule mining algorithms performance analysis. Int J Eng Res Technol (IJERT) 3(8), IJERTIJERT ISSN: 2278-0181

    Google Scholar 

  31. Natarajasivan D, Govindarajan M (2016) Context aware user interface recommendation system. Int J Innov Res Sci, Eng Technol 5(5), ISSN(Online): 2319-8753

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bonagiri Jyothi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jyothi, B., Lakshmi, V.N. (2023). Privacy Preserving Datamining Techniques with Data Security in Data Transformation. In: Satapathy, S.C., Lin, J.CW., Wee, L.K., Bhateja, V., Rajesh, T.M. (eds) Computer Communication, Networking and IoT. Lecture Notes in Networks and Systems, vol 459. Springer, Singapore. https://doi.org/10.1007/978-981-19-1976-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-1976-3_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-1975-6

  • Online ISBN: 978-981-19-1976-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics