Optimization techniques for preserving privacy in data mining

K. Devi, K. Balasamy, M. Prathyusha, R. Jeevitha, P. Balasubramanie, M. Eswaran
{"title":"Optimization techniques for preserving privacy in data mining","authors":"K. Devi, K. Balasamy, M. Prathyusha, R. Jeevitha, P. Balasubramanie, M. Eswaran","doi":"10.1109/ICECCT56650.2023.10179655","DOIUrl":null,"url":null,"abstract":"Data mining is one of the significant area where it plays a predominant role in extracting important factors and trends from large volume of data. This covers various areas such as healthcare, education, entertainment, finance, e-commerce applications etc., The data mining domain has used a variety of algorithms, including supervised, unsupervised, semi-supervised, and reinforcement learning techniques. Under healthcare arena, it deals with huge amount of sensitive data such as patients' data such as their name, age, health records. Those sensitive data have been utilized by the intruders for extracting the original data and also became a prey for the authorized access. Hence, the privacy is one of the serious concern that should be addressed. Various privacy preserving in data mining (PPDM) techniques such as anonymization, perturbation, condensation and cryptographic methods are available to protect those data. In this paper, the optimization techniques such as Genetic algorithm(GA) under evolutionary method and Particle swarm optimization(PSO) under meta heuristic method have been discussed and how it plays an important part in providing more optimal results by securing those sensitive and important information from the unauthorized access.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCT56650.2023.10179655","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Data mining is one of the significant area where it plays a predominant role in extracting important factors and trends from large volume of data. This covers various areas such as healthcare, education, entertainment, finance, e-commerce applications etc., The data mining domain has used a variety of algorithms, including supervised, unsupervised, semi-supervised, and reinforcement learning techniques. Under healthcare arena, it deals with huge amount of sensitive data such as patients' data such as their name, age, health records. Those sensitive data have been utilized by the intruders for extracting the original data and also became a prey for the authorized access. Hence, the privacy is one of the serious concern that should be addressed. Various privacy preserving in data mining (PPDM) techniques such as anonymization, perturbation, condensation and cryptographic methods are available to protect those data. In this paper, the optimization techniques such as Genetic algorithm(GA) under evolutionary method and Particle swarm optimization(PSO) under meta heuristic method have been discussed and how it plays an important part in providing more optimal results by securing those sensitive and important information from the unauthorized access.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
数据挖掘中保护隐私的优化技术
数据挖掘是一个重要的领域,它在从大量数据中提取重要因素和趋势方面发挥着主导作用。这涵盖了医疗保健、教育、娱乐、金融、电子商务应用等各个领域,数据挖掘领域使用了各种算法,包括监督、无监督、半监督和强化学习技术。在医疗保健领域,它处理大量敏感数据,如患者的姓名、年龄、健康记录等数据。这些敏感数据被入侵者用来提取原始数据,也成为授权访问的猎物。因此,隐私问题是需要解决的严重问题之一。数据挖掘(PPDM)中的各种隐私保护技术,如匿名化、微扰、凝聚和加密方法,可用于保护这些数据。本文讨论了进化方法下的遗传算法(GA)和元启发式方法下的粒子群优化(PSO)等优化技术,以及它们如何通过保护敏感和重要信息不被非法访问来提供更优的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Model of Markovian Queue with Catastrophe, Restoration and Balking Nibble Based Two Bit Invert Coding Technique for Serial Network on Chip Links Hesitant Triangular Fuzzy Dombi Operators and Its Applications Fuel Cost Optimization of Coal-Fired Power Plants using Coal Blending Proportions An Efficient Classification for Light Motor Vehicles using CatBoost Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1