A Privacy-Preserving Data Mining Through Comprehensive GNIPP Approach in Sensitive Data Sets

Authors

DOI:

https://doi.org/10.52756/ijerr.2024.v44spl.002

Keywords:

Cumulative noise, data mining , data perturbation, privacy preservation, RPCN

Abstract

The quick growth of methods for analyzing data and the availability of easily available datasets have made it possible to build a thorough analytics model that can help with support decision-making. In the meantime, protecting personal privacy is crucial. A popular technique for medical evaluation and prediction, decision trees are easy to comprehend and interpret. However, the decision tree construction procedure may reveal personal information about an individual. By keeping the statistical properties intact and limiting the chance of privacy leaking within a reasonable bound, differential privacy offers a formal mathematical definition of privacy. To construct a boosting random forest that preserves privacy, we propose a Gaussian Noise Integrated Privacy Preservation (GNIPP) in this study. To address the issue of personal information breaches, we have designed a unique Gaussian distribution mechanism in GNIPP that enables the nodes with deeper depth to obtain more privacy during the decision tree construction process. We propose a comprehensive boosting technique based on the decision forest's prediction accuracy for assembling multiple decision trees into a forest. Furthermore, we propose an iterative technique to accelerate the assembly of decision trees. After all, we demonstrate through experimentation that the suggested GNIPP outperforms alternative algorithms on two real-world datasets.

References

Batista, E., Martínez-Ballesté, A., & Solanas, A. (2022). Privacy-preserving process mining: A microaggregation-based approach. Journal of Information Security and Applications, 68, 103235. https://doi.org/10.1016/j.jisa.2022.103235. DOI: https://doi.org/10.1016/j.jisa.2022.103235

Chamikara, M., Bertok, P., Khalil, I., Liu, D., & Camtepe, S. (2021). PPAAS: Privacy Preservation as a service. Computer Communications, 173, 192–205. https://doi.org/10.1016/j.comcom.2021.04.006. DOI: https://doi.org/10.1016/j.comcom.2021.04.006

Chamikara, M., Bertok, P., Liu, D., Camtepe, S., & Khalil, I. (2019). Efficient privacy preservation of big data for accurate data mining. Information Sciences, 527, 420–443. https://doi.org/10.1016/j.ins.2019.05.053 DOI: https://doi.org/10.1016/j.ins.2019.05.053

Jain, P., & Nandanwar, S. (2015). Securing the clustered database using data modification Technique. https://doi.org/10.1109/cicn.2015.331. DOI: https://doi.org/10.1109/CICN.2015.331

Jain, P., Shakya, H. K., & Lala, A. (2023). Advanced privacy Preserving model for smart healthcare using deep learning. 2023 6th International Conference on Contemporary Computing and Informatics (IC3I), Gautam Buddha Nagar, India. 39, 2368–2372. https://doi.org/10.1109/ic3i59117.2023.10397954 DOI: https://doi.org/10.1109/IC3I59117.2023.10397954

Jain, P., & Thada, V. (2024). Securing the Data Using an Efficient Machine Learning Technique. International Journal of Experimental Research and Review, 40(Spl Volume), 217-226. https://doi.org/10.52756/ijerr.2024.v40spl.018 DOI: https://doi.org/10.52756/ijerr.2024.v40spl.018

Karmore, S. P., & Mahajan, A. R. (2016). New Approach for Testing and Providing Security Mechanism for Embedded Systems. Procedia Computer Science, 78, 851–858. https://doi.org/10.1016/j.procs.2016.02.073. DOI: https://doi.org/10.1016/j.procs.2016.02.073

Kiran, A., & Shirisha, N. (2022). K-Anonymization approach for privacy preservation using data perturbation techniques in data mining. Materials Today Proceedings, 64, 578–584. https://doi.org/10.1016/j.matpr.2022.05.117. DOI: https://doi.org/10.1016/j.matpr.2022.05.117

Kulkarni, Y. R., Jagdale, B., & Sugave, S. R. (2022). Optimized key generation-based privacy preserving data mining model for secure data publishing. Advances in Engineering Software, 175, 103332. https://doi.org/10.1016/j.advengsoft.2022.103332. DOI: https://doi.org/10.1016/j.advengsoft.2022.103332

Kumar, G. S., Premalatha, K., Maheshwari, G. U., & Kanna, P. R. (2023). No more privacy Concern: A privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user’s private and sensitive data. Expert Systems with Applications, 234, 121071. https://doi.org/10.1016/j.eswa.2023.121071. DOI: https://doi.org/10.1016/j.eswa.2023.121071

Kumar, G. S., Premalatha, K., Maheshwari, G. U., Kanna, P. R., Vijaya, G., & Nivaashini, M. (2023). Differential privacy scheme using Laplace mechanism and statistical method computation in deep neural network for privacy preservation. Engineering Applications of Artificial Intelligence, 128, 107399. https://doi.org/10.1016/j.engappai.2023.107399. DOI: https://doi.org/10.1016/j.engappai.2023.107399

KumarTripathi, K. (2016). Discrimination Prevention with Classification and Privacy Preservation in Data mining. Procedia Computer Science, 79, 244–253. https://doi.org/10.1016/j.procs.2016.03.032. DOI: https://doi.org/10.1016/j.procs.2016.03.032

Ling, J., Zheng, J., & Chen, J. (2024). Efficient Federated Learning Privacy Preservation Method with Heterogeneous Differential Privacy. Computers & Security, 139, 103715. https://doi.org/10.1016/j.cose.2024.103715. DOI: https://doi.org/10.1016/j.cose.2024.103715

Rafiei, M., & Van Der Aalst, W. M. (2021). Group-based privacy preservation techniques for process mining. Data & Knowledge Engineering, 134, 101908. https://doi.org/10.1016/j.datak.2021.101908. DOI: https://doi.org/10.1016/j.datak.2021.101908

Silva, J., Cubillos, J., Villa, J. V., Romero, L., Solano, D., & Fernández, C. (2019). Preservation of confidential information privacy and association rule hiding for data mining: a bibliometric review. Procedia Computer Science, 151, 1219–1224. https://doi.org/10.1016/j.procs.2019.04.175. DOI: https://doi.org/10.1016/j.procs.2019.04.175

Talat, R., Obaidat, M. S., Muzammal, M., Sodhro, A. H., Luo, Z., & Pirbhulal, S. (2019). A decentralised approach to privacy preserving trajectory mining. Future Generation Computer Systems, 102, 382–392. https://doi.org/10.1016/j.future.2019.07.068. DOI: https://doi.org/10.1016/j.future.2019.07.068

Vyas, P. J. V. T. S. K. (2024). Achieving highest privacy preservation using efficient Machine Learning Technique. https://ijisae.org/index.php/IJISAE/article/view/5434.

Vyas, S. K., Karmore, S., & Jain, P. (2024). A Privacy-Preserving Data Mining Approach in Multi-Dimensional Data Set based on the Random and Cumulative Integrated Noise. https://www.ijisae.org/index.php/IJISAE/article/view/4892.

Vyas, S., & Karmore, S. (2022). Design and Development of Privacy Preservation Approach in Data Mining: A literature review paper. Proceedings of the International Conference on Innovative Computing & Communication (ICICC), 2022. https://doi.org/10.2139/ssrn.4021313. DOI: https://doi.org/10.2139/ssrn.4021313

Wu, H., Ran, R., Peng, S., Yang, M., & Guo, T. (2023). Mining frequent items from high-dimensional set-valued data under local differential privacy protection. Expert Systems with Applications, 234, 121105. https://doi.org/10.1016/j.eswa.2023.121105. DOI: https://doi.org/10.1016/j.eswa.2023.121105

Yu, S., Wei, Z., Sun, G., Zhou, Y., & Zang, H. (2023). A double auction mechanism for virtual power plants based on blockchain sharding consensus and privacy preservation. Journal of Cleaner Production, 436, 140285. https://doi.org/10.1016/j.jclepro.2023.140285. DOI: https://doi.org/10.1016/j.jclepro.2023.140285

Published

2024-10-30

How to Cite

Vyas, S. K., & Karmore, S. (2024). A Privacy-Preserving Data Mining Through Comprehensive GNIPP Approach in Sensitive Data Sets. International Journal of Experimental Research and Review, 44, 11–19. https://doi.org/10.52756/ijerr.2024.v44spl.002