Improved privacy protecting in distributed grid data resource using multiplicative perturbation based on frequent decision classifier

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The enormous amount of data process in distributed grid resource holds sensitive information on centralized access. The common privacy standard needs advancement to protect the sensitive data in various sectors like sharing, legal privacy and policies to access the data. The privacy standards depend the Distributed Data Mining (DDM) approaches like Association Rule Mining algorithms (ARM), clustering, and classification methods to preserve the data from unauthorized access. But the security standards have lacked privacy-preserving rules due to high dimensionality problems of data access leads more time complexity. To overcome the problem, to propose a Multiplicative Perturbation Swapping method based on Frequent Decision Classifier (MPS-FDC). This method is adaptive to data publishing secrecy to hold the privacy standards better than association rule prediction. This optimization resolves the forecasting leakages based on Persuasive Privacy Preserving Data Mining (P2PDM) to secure the data. Which this technique initially does the sanitization to reduce the dimensionality to remove un-variant the outliers. The data perturbation keeps the original data to modify using supportive noise delimiters with state matrix distortion (SMD). So the original data keep safe without effect from the outliers. The frequent rule prediction decides to classify the recurrentdata from unauthorized access to disclosing crypto-privacy policy. The proposed system improves the privacy standard compared to the ARM specification rules.

Cite

CITATION STYLE

APA

Praveen Kumar, G., Mohan Rao, S. K., & Swathi, B. V. (2019). Improved privacy protecting in distributed grid data resource using multiplicative perturbation based on frequent decision classifier. International Journal of Innovative Technology and Exploring Engineering, 8(11 Special issue 2), 131–139. https://doi.org/10.35940/ijitee.K1021.09811S219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free