Open AccessOpen Access


Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation

B. Murugeshwari1,*, S. Rajalakshmi1, K. Sudharson2

1 Department of Computer Science and Engineering, Velammal Engineering College, Chennai, 600066, India
2 Department of Information Technology, Velammal Institute of Technology, Chennai, 601204, India

* Corresponding Author: B. Murugeshwari. Email:

Computer Systems Science and Engineering 2023, 44(3), 2293-2307.


Imagine numerous clients, each with personal data; individual inputs are severely corrupt, and a server only concerns the collective, statistically essential facets of this data. In several data mining methods, privacy has become highly critical. As a result, various privacy-preserving data analysis technologies have emerged. Hence, we use the randomization process to reconstruct composite data attributes accurately. Also, we use privacy measures to estimate how much deception is required to guarantee privacy. There are several viable privacy protections; however, determining which one is the best is still a work in progress. This paper discusses the difficulty of measuring privacy while also offering numerous random sampling procedures and statistical and categorized data results. Furthermore, this paper investigates the use of arbitrary nature with perturbations in privacy preservation. According to the research, arbitrary objects (most notably random matrices) have "predicted" frequency patterns. It shows how to recover crucial information from a sample damaged by a random number using an arbitrary lattice spectral selection strategy. This filtration system's conceptual framework posits, and extensive practical findings indicate that sparse data distortions preserve relatively modest privacy protection in various situations. As a result, the research framework is efficient and effective in maintaining data privacy and security.


Cite This Article

B. Murugeshwari, S. Rajalakshmi and K. Sudharson, "Hybrid approach for privacy enhancement in data mining using arbitrariness and perturbation," Computer Systems Science and Engineering, vol. 44, no.3, pp. 2293–2307, 2023.

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 746


  • 398


  • 1


Share Link