Privacy Preserving Based on PCA Transformation Using Data Perturbation Technique

Abstract

Maintain confidentiality, privacy and security research in data mining (PPDM) is one of the biggest trends. Recent advances in data collection, data dissemination and related technologies have inaugurated a new era of research where existing data mining algorithms should be reconsidered from a different point of view, this of privacy preservation. We propose a simple PCA based transformation approach for various datasets to preserve privacy and maintain accuracy based on clustering. A privacy soil, the proposal to convert the data into nature, conservation saves. The accuracy of clustering before and after privacy preserving transformation was estimated.

Authors and Affiliations

Samir Patel , Kiran R. Amin

Keywords

Related Articles

Concept-Based Document Similarity Based on Suffix Tree Document

Document clustering has been studied as a post retrieval document visualization technique to provide an intuitive navigation and browsing mechanism by organizing documents into groups and each group represents a differen...

Krill Herd Clustering Algorithm using DBSCAN Technique

The hybrid approach is proposed to show that the clusters also show the swarm behavior. Krill herd algorithm is used to show the simulation of the herding behavior of the krill individuals. Density based approach is used...

RDF method to improve ontology using RDF algorithm

A Relation description frame work we used semantic based collections using crawlers. The semantic matching and relevancy are made and improved results are obtained. RDF helps us to generate a hierarchy based tree structu...

Elliptic Curve Public-Key Cryptosystem Over Z(i)

A method to implement elliptic curve public-key cryptosystem over Z(i) is discussed. The method is in fact the same as the technique that works on Galois fields but here works on Z(i). The curve under Z(i) generates more...

Survey Report on Software Cost Estimation using Use Case Point Method

Software estimation is an important activity in software project management. Many software projects fail because of the inaccurate and untimely estimation of cost. Estimation in the early stages of the software life cycl...

Download PDF file
  • EP ID EP98597
  • DOI -
  • Views 146
  • Downloads 0

How To Cite

Samir Patel, Kiran R. Amin (2013). Privacy Preserving Based on PCA Transformation Using Data Perturbation Technique. International Journal of Computer Science & Engineering Technology, 4(5), 477-484. https://europub.co.uk./articles/-A-98597