Skip to main content

Ensuring Data Privacy Using Machine Learning for Responsible Data Science

  • Conference paper
  • First Online:
Intelligent Data Engineering and Analytics

Abstract

With the advancement use of computers extensively the use of data has also grown to big data level. Nowadays data is collected without any specific purpose, every activity of a machine or a human being is recorded, If needed in the future then the data will be analyzed. But here the question of trust arises as the data will go through many phases for the analysis by different parties. The data may contain some sensitive or private information which can be misutilized by the organizations involved in the analysis stages. So it is needed for the hour to consider the data privacy issues very seriously. Different types of methods have been proposed in this paper to ensure data privacy and also different machine learning algorithms have been discussed which have been used to design the proposed methods to ensure data privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Srivastava, Divesh, Scannapieco, Monica, Redman, Thomas C.: Ensuring high-quality private data for responsible data science: vision and challenges. J. Data. Info. Q. (JDIQ) 11(1), 1 (2019)

    Google Scholar 

  2. Singh, S., Prabhakar, S.: Ensuring correctness over untrusted private database. In: Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology, pp. 476–486. ACM (March 2008)

    Google Scholar 

  3. Woodall, P.M.: The data repurposing challenge: new pressures from data analytics. (2017)

    Google Scholar 

  4. Chen, D.L., Jess, E.: Can machine learning help predict the outcome of asylum adjudications?. In: Proceedings of the 16th Edition of the International Conference on Articial Intelligence and Law. ACM (2017)

    Google Scholar 

  5. Andrews, V.: Analyzing awareness on data privacy. In: Proceedings of the 2019 ACM Southeast Conference. ACM, (2019)

    Google Scholar 

  6. Liu, X., et al.: “Preserving patient privacy when sharing same-disease data. J. Data Info. Q. (JDIQ) 7(4), 17 (2016)

    Google Scholar 

  7. Bishop, C.M.: Pattern recognition and machine learning. In: Springer Science  Business Media, (2006)

    Google Scholar 

  8. Smith, M., et al.: Big data privacy issues in public social media. In: 2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST). IEEE, (2012)

    Google Scholar 

  9. Chen, D., Hong, Z.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 1. IEEE, (2012)

    Google Scholar 

  10. Buczak, Anna L., Guven, Erhan: A survey of data mining and machine learn-ing methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153–1176 (2015)

    Article  Google Scholar 

  11. Liu, Kun, Kargupta, Hillol, Ryan, Jessica: Random projection-based multi-plicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1), 92–106 (2005)

    Google Scholar 

  12. Mohanta, B.K., Panda, S.S., Jena, D.: An overview of smart contract and use cases in blockchain tech-nology. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICC-CNT), (July 2018). https://doi.org/10.1109/icccnt.2018.8494045

  13. Cyphers, B., Veeramachaneni, K.: AnonML: locally private machine learning over a network of peers’ (2017)

    Google Scholar 

  14. Narayanan, A., Shmatikov, V.: ‘Robust de-anonymization of large sparse datasets. In: Proceedings—IEEE Symposium on Security and Privacy, pp. 111–125 (2008)

    Google Scholar 

  15. Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, pp. 3–18 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunil Samanta Singhar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jena, M.D., Singhar, S.S., Mohanta, B.K., Ramasubbareddy, S. (2021). Ensuring Data Privacy Using Machine Learning for Responsible Data Science. In: Satapathy, S., Zhang, YD., Bhateja, V., Majhi, R. (eds) Intelligent Data Engineering and Analytics. Advances in Intelligent Systems and Computing, vol 1177. Springer, Singapore. https://doi.org/10.1007/978-981-15-5679-1_49

Download citation

Publish with us

Policies and ethics