Skip to main content
Erschienen in: Cluster Computing 6/2022

12.07.2022

Multi-objective optimization-based privacy in data mining

verfasst von: Hemanta Kumar Bhuyan, Vinayakumar Ravi, M. Srikanth Yadav

Erschienen in: Cluster Computing | Ausgabe 6/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper addresses the data privacy based on interactive computation using an optimization model in data mining. When data are computed or sharing among users in online, it needs to maintain privacy for all computation during sharing of data. But user choice-based privacy is not available when sharing of data is required for data mining computation which is a big challenge for data privacy. Thus, we proposed the framework for anonymity of data privacy using various methods of multi-objective models as per the requirement of privacy. The proposed framework is designed with the help of two objects such as computational cost and privacy based on optimization model. Our framework maintains the balance between above objects as per user demands, i.e., increasing the privacy with decreasing the computational cost. In this model, the domain of privacy and computational cost for optimization problem solves the entity privacy requirements in a computing environment. We have used various methods such as Gaussian and uniform distribution, confidence interval, activation function, linear membership function with distinguish manner for maintaining of privacy and cost. As per the uniform distribution and parameter α-cut value for noise data, the optimal value is made accordingly. Example: for α = 0.2, and uniform distribution (− 1, 1), the optimal value is 0.0058. Similarly, as per different α values, classifiers result is different like α = 0.2 and 0.4, Multilayer perceptron values are 4.01 and 1.61 respectively. The solution of the proposed model controls the amount of privacy with complete freedom of choice of users with utmost flexibility.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
4.
Zurück zum Zitat Cadenas, J.M., Verdegy, J.L.: A primer on fuzzy optimization models and methods. Iran. J. Fuzzy Syst. 3(1), 1–21 (2006)MathSciNet Cadenas, J.M., Verdegy, J.L.: A primer on fuzzy optimization models and methods. Iran. J. Fuzzy Syst. 3(1), 1–21 (2006)MathSciNet
5.
Zurück zum Zitat Herrera, F., Verdegay, J.L.: Three models of fuzzy integer linear programmining. Eur. J. Oper. Res. 83, 581–593 (1995)CrossRefMATH Herrera, F., Verdegay, J.L.: Three models of fuzzy integer linear programmining. Eur. J. Oper. Res. 83, 581–593 (1995)CrossRefMATH
6.
Zurück zum Zitat Bayardo, R. J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of ICDE'05, Washington, DC, USA, IEEE Computer Society, pp. 217–228, 2005 Bayardo, R. J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of ICDE'05, Washington, DC, USA, IEEE Computer Society, pp. 217–228, 2005
8.
Zurück zum Zitat Alzubi, O.A., Alzubi, J.A., Shankar, K., Gupta, D.: Blockchain and artificial intelligence enabled privacy preserving medical data transmission in internet of things. Trans. Emerg. Telecommun. Technol. 32(2), 1–14 (2021) Alzubi, O.A., Alzubi, J.A., Shankar, K., Gupta, D.: Blockchain and artificial intelligence enabled privacy preserving medical data transmission in internet of things. Trans. Emerg. Telecommun. Technol. 32(2), 1–14 (2021)
9.
Zurück zum Zitat Krivitski, D., Schuster, A., Wolff, R.: A local facility location algorithm for large-scale distributed systems. J. Grid Comput. 5(4), 361–378 (2007)CrossRef Krivitski, D., Schuster, A., Wolff, R.: A local facility location algorithm for large-scale distributed systems. J. Grid Comput. 5(4), 361–378 (2007)CrossRef
10.
Zurück zum Zitat Xiao, Y., Xiong, L., Fan, L., Goryczka, S., Li, H.: DPCube: differentially private histogram release through multidimensional partitioning. Trans. Data Priv. 7(3), 195–222 (2014)MathSciNet Xiao, Y., Xiong, L., Fan, L., Goryczka, S., Li, H.: DPCube: differentially private histogram release through multidimensional partitioning. Trans. Data Priv. 7(3), 195–222 (2014)MathSciNet
11.
Zurück zum Zitat Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. Trans. Data Priv. 6(2), 161–183 (2014)MathSciNet Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. Trans. Data Priv. 6(2), 161–183 (2014)MathSciNet
15.
Zurück zum Zitat Perez, I.J., Alonso, S., Cabrerizo, F.J., Lu, J., Herrera-Viedma, E.: Modelling Heterogeneity among Experts in Multi-criteria Group Decision Making Problems, pp. 55–66. Springer-Verlag, Berlin (2011) Perez, I.J., Alonso, S., Cabrerizo, F.J., Lu, J., Herrera-Viedma, E.: Modelling Heterogeneity among Experts in Multi-criteria Group Decision Making Problems, pp. 55–66. Springer-Verlag, Berlin (2011)
16.
Zurück zum Zitat Dutta, D., Murthy, S.: Multi-choice goal programming approach for a fuzzy transportation problem. IJRRAS 2(2), 132 (2010)MATH Dutta, D., Murthy, S.: Multi-choice goal programming approach for a fuzzy transportation problem. IJRRAS 2(2), 132 (2010)MATH
17.
Zurück zum Zitat Jimenez, F., Cadenas, J.M., Sanchez, G., Gomez-Skarmeta, A.F., Verdegay, J.L.: Multiobjective evolutionary computation and fuzzy optimization. Int. J. Approx. Reason. 43, 59–75 (2006)CrossRefMATH Jimenez, F., Cadenas, J.M., Sanchez, G., Gomez-Skarmeta, A.F., Verdegay, J.L.: Multiobjective evolutionary computation and fuzzy optimization. Int. J. Approx. Reason. 43, 59–75 (2006)CrossRefMATH
18.
Zurück zum Zitat Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)CrossRefMATH Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)CrossRefMATH
19.
Zurück zum Zitat Deb, K.: Multiobjective Optimization Using Evolutionary Algorithms. Wiley, Hoboken (2001)MATH Deb, K.: Multiobjective Optimization Using Evolutionary Algorithms. Wiley, Hoboken (2001)MATH
21.
Zurück zum Zitat Mukherjee, S., Chen, Z., Gangopadhyay, A.: A fuzzy programming approach for data reduction and privacy in distance based mining. Int. J. Inf. Comput. Secur. 2(1), 27–47 (2008) Mukherjee, S., Chen, Z., Gangopadhyay, A.: A fuzzy programming approach for data reduction and privacy in distance based mining. Int. J. Inf. Comput. Secur. 2(1), 27–47 (2008)
22.
Zurück zum Zitat Asuncion, A., Newman, D.: UCI machine learning repository, 2007. Asuncion, A., Newman, D.: UCI machine learning repository, 2007.
23.
Zurück zum Zitat Bhuyan, H.K., Kamila, N.K.: Privacy preserving sub-feature selection based on fuzzy probabilities. Clust. Comput. 17(4), 1383–1399 (2014)CrossRef Bhuyan, H.K., Kamila, N.K.: Privacy preserving sub-feature selection based on fuzzy probabilities. Clust. Comput. 17(4), 1383–1399 (2014)CrossRef
24.
Zurück zum Zitat Bhuyan, H.K., Mohanty, M., Das, S.R.: Privacy preserving for feature selection in data mining using centralized network. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 434–440 (2012) Bhuyan, H.K., Mohanty, M., Das, S.R.: Privacy preserving for feature selection in data mining using centralized network. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 434–440 (2012)
25.
Zurück zum Zitat Teo, S.G., Cao, J., Lee, V.C.S.: DAG: a general model for privacy-preserving data mining. IEEE Trans. Knowl. Data Eng. 32(1), 40–53 (2020)CrossRef Teo, S.G., Cao, J., Lee, V.C.S.: DAG: a general model for privacy-preserving data mining. IEEE Trans. Knowl. Data Eng. 32(1), 40–53 (2020)CrossRef
26.
Zurück zum Zitat Kim, S., Shin, H., Baek, C., Kim, S., Shin, J.: Learning New Words from Keystroke Data with Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 32(3), 479–491 (2020)CrossRef Kim, S., Shin, H., Baek, C., Kim, S., Shin, J.: Learning New Words from Keystroke Data with Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 32(3), 479–491 (2020)CrossRef
27.
Zurück zum Zitat Christen, P., Ranbaduge, T., Vatsalan, D., Schnell, R.: Precise and fast cryptanalysis for bloom filter based privacy-preserving record linkage. IEEE Trans. Knowl. Data Eng. 31(11), 2164–2177 (2019)CrossRef Christen, P., Ranbaduge, T., Vatsalan, D., Schnell, R.: Precise and fast cryptanalysis for bloom filter based privacy-preserving record linkage. IEEE Trans. Knowl. Data Eng. 31(11), 2164–2177 (2019)CrossRef
28.
Zurück zum Zitat Bhuyan, H.K., Dash, S.K., Roy, S., Swain, D.K.: Privacy preservation with penalty in decentralized network using multiparty computation. Int. J. Adv. Comput. Technol. (IJACT) 4(1), 297–303 (2012) Bhuyan, H.K., Dash, S.K., Roy, S., Swain, D.K.: Privacy preservation with penalty in decentralized network using multiparty computation. Int. J. Adv. Comput. Technol. (IJACT) 4(1), 297–303 (2012)
29.
Zurück zum Zitat Bhuyan, H.K., Kamila, N.K., Dash, S.K.: An approach for privacy preservation of distributed data in peer to-peer network using multiparty computation. Int. J. Comput. Sci. Issues (IJCSI) 3(8), 424–429 (2011) Bhuyan, H.K., Kamila, N.K., Dash, S.K.: An approach for privacy preservation of distributed data in peer to-peer network using multiparty computation. Int. J. Comput. Sci. Issues (IJCSI) 3(8), 424–429 (2011)
30.
Zurück zum Zitat Kamila, N.K., Jena, L.D., Bhuyan, H.K.: Pareto-based multiobjective optimization for classification in data mining. Clust. Comput. (Springer) 19, 1723–1745 (2016)CrossRef Kamila, N.K., Jena, L.D., Bhuyan, H.K.: Pareto-based multiobjective optimization for classification in data mining. Clust. Comput. (Springer) 19, 1723–1745 (2016)CrossRef
31.
Zurück zum Zitat Bhuyan, H. K., Madhusudan Reddy, C. V.: Sub-feature selection for novel classification. In: IEEE Explore. April, 2018. Bhuyan, H. K., Madhusudan Reddy, C. V.: Sub-feature selection for novel classification. In: IEEE Explore. April, 2018.
33.
Zurück zum Zitat Bhuyan, H. K., Raghu Kumar, L., Reddy, K. R.: Optimization model for Sub-feature selection in data mining. In: IEEE Explore. (2020) Bhuyan, H. K., Raghu Kumar, L., Reddy, K. R.: Optimization model for Sub-feature selection in data mining. In: IEEE Explore. (2020)
34.
Zurück zum Zitat Alazab, M., Lakshmanna, K., Reddy, T., Pham, Q.V., Maddikunta, P.K.: Multi objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities. Sustain. Energy Technol. Assess. 43, 1–19 (2021) Alazab, M., Lakshmanna, K., Reddy, T., Pham, Q.V., Maddikunta, P.K.: Multi objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities. Sustain. Energy Technol. Assess. 43, 1–19 (2021)
35.
Zurück zum Zitat Kumar, R., Kumar, P., Tripathi, R., Gupta, G.P., Gadekallu, T.R., Srivastava, G.: Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput. Netw. 187, 1–15 (2021)CrossRef Kumar, R., Kumar, P., Tripathi, R., Gupta, G.P., Gadekallu, T.R., Srivastava, G.: Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput. Netw. 187, 1–15 (2021)CrossRef
36.
Zurück zum Zitat Kumar, P., Kumar, R., Srivastava, G., Gupta, G.P., Tripathi, R., Gadekallu, T.R., Xiong, N.N.: PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 8(3), 2326–2341 (2021)CrossRef Kumar, P., Kumar, R., Srivastava, G., Gupta, G.P., Tripathi, R., Gadekallu, T.R., Xiong, N.N.: PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 8(3), 2326–2341 (2021)CrossRef
Metadaten
Titel
Multi-objective optimization-based privacy in data mining
verfasst von
Hemanta Kumar Bhuyan
Vinayakumar Ravi
M. Srikanth Yadav
Publikationsdatum
12.07.2022
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 6/2022
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-022-03667-3

Weitere Artikel der Ausgabe 6/2022

Cluster Computing 6/2022 Zur Ausgabe

Premium Partner