Skip to main content
Log in

Image-based random rotation for preserving the data in data mining process

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

The privacy and security of big data have become a major concern in recent years, necessitating privacy-preserving data mining strategies to preserve the balance between data value and privacy. The application of data mining techniques to the web is known as web mining. The majority of consumers seek complete anonymity when using web apps and engaging in online activities, which raises privacy problems. Condensation, randomness, tree structure, and other traditional approaches are employed to maintain privacy. Existing techniques have limitations in that they are unable to balance data usefulness and may have privacy and scalability issues. Privacy-preserving tools such as encryption and machine learning techniques, among others, can be used to protect and classify the data stream. To overcome this, here, the data are transformed into image, and then, the random transformation is performed using enhanced particle swarm optimization. Here, the optimization is performed to identify the optimal random rotation of the data for both protection and better classification. The classification is performed through back propagation algorithm, and the perturbed data are tested against independent component analysis attack. The classification accuracy, computation time, and error rate of the classifier are measured, and it is compared with the existing method. The comparison result shows the achieved result of proposed method. This proposed system is done with the help of MATLAB 2021a.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability statement

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Jones, D.E., Ghandehari, H., Facelli, J.C.: A review of the applications of data mining and machine learning for the prediction of biomedical properties of nanoparticles. Comput. Methods Programs Biomed. 132, 93–103 (2016)

    Article  Google Scholar 

  2. Lin, C.Y.: A reversible data transform algorithm using integer transform for privacy-preserving data mining. J. Syst. Softw. 117, 104–112 (2016)

    Article  Google Scholar 

  3. Aldeen, Y.A.A.S., Salleh, M., Aljeroudi, Y.: An innovative privacy preserving technique for incremental datasets on cloud computing. J. Biomed. Inform. 62, 107–116 (2016)

    Article  Google Scholar 

  4. Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016)

    Article  Google Scholar 

  5. Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and applications. IEEE Access 5, 10562–10582 (2017)

    Article  Google Scholar 

  6. Ilavarasi, A.K., Sathiyabhama, B.: An evolutionary feature set decomposition based anonymization for classification workloads: privacy preserving data mining. Clust. Comput. 20(4), 3515–3525 (2017)

    Article  Google Scholar 

  7. Li, P., Li, J., Huang, Z., Li, T., Gao, C.Z., Yiu, S.M., Chen, K.: Multi-key privacy-preserving deep learning in cloud computing. Futur. Gener. Comput. Syst. 74, 76–85 (2017)

    Article  Google Scholar 

  8. Wang, J., Hu, S., Wang, Q., Ma, Y.: Privacy-preserving outsourced feature extractions in the cloud: a survey. IEEE Network 31(5), 36–41 (2017)

    Article  Google Scholar 

  9. Li, P., Li, T., Ye, H., Li, J., Chen, X., Xiang, Y.: Privacy-preserving machine learning with multiple data providers. Futur. Gener. Comput. Syst. 87, 341–350 (2018)

    Article  Google Scholar 

  10. Jia, Q., Guo, L., Fang, Y., Wang, G.: Efficient privacy-preserving machine learning in hierarchical distributed system. IEEE Trans. Netw. Sci. Eng. 6(4), 599–612 (2018)

    Article  MathSciNet  Google Scholar 

  11. Zhao, Y., Yu, Y., Li, Y., Han, G., Du, X.: Machine learning based privacy-preserving fair data trading in big data market. Inf. Sci. 478, 449–460 (2019)

    Article  Google Scholar 

  12. Yu, Y., Li, H., Chen, R., Zhao, Y., Yang, H., Du, X.: Enabling secure intelligent network with cloud-assisted privacy-preserving machine learning. IEEE Netw. 33(3), 82–87 (2019)

    Article  Google Scholar 

  13. Arachchige, P.C.M., Bertok, P., Khalil, I., Liu, D., Camtepe, S., Atiquzzaman, M.: A trustworthy privacy preserving framework for machine learning in industrial IoT systems. IEEE Trans. Industr. Inf. 16(9), 6092–6102 (2020)

    Article  Google Scholar 

  14. Tanuwidjaja, H.C., Choi, R., Baek, S., Kim, K.: Privacy-preserving deep learning on machine learning as a service—a comprehensive survey. IEEE Access 8, 167425–167447 (2020)

    Article  Google Scholar 

  15. Kousika, N., Premalatha, K.: An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation. J. Supercomput. 77(9), 10003–10011 (2021)

    Article  Google Scholar 

  16. Reddy, V.S., Rao, B.T.: A combined clustering and geometric data perturbation approach for enriching privacy preservation of healthcare data in hybrid clouds. International Journal of Intelligent Engineering and Systems 11(1), 201–210 (2018)

    Article  Google Scholar 

  17. Kaliappan, S.: A hybrid clustering approach and random rotation perturbation (RRP) for privacy preserving data mining. Int. J. Intell. Eng. Syst. 11(6), 167–176 (2018)

    Google Scholar 

  18. Upadhyay, S., Sharma, C., Sharma, P., Bharadwaj, P., Seeja, K.R.: Privacy preserving data mining with 3-D rotation transformation. J. King Saud Univ.-Comp. Inform. Sci. 30(4), 524–530 (2018)

    Google Scholar 

  19. Li, C., Palanisamy, B., Krishnamurthy, P.: Reversible data perturbation techniques for multi-level privacy-preserving data publication. In: International Conference on Big Data (pp. 26–42). Springer, Cham (2018).

  20. Jisna, J., Salim, A.: Privacy preserving data utility mining using perturbation. In: International Conference on Distributed Computing and Internet Technology (pp. 112–120). Springer, Cham (2018).

  21. Chamikara, M.A.P., Bertók, P., Liu, D., Camtepe, S., Khalil, I.: An efficient and scalable privacy preserving algorithm for big data and data streams. Comput. Secur. 87, 101570 (2019)

    Article  Google Scholar 

  22. Zhang, Y., Hao, Z., Wang, S.: A differential privacy support vector machine classifier based on dual variable perturbation. IEEE Access 7, 98238–98251 (2019)

    Article  Google Scholar 

  23. Rajesh, N., Selvakumar, A.A.L.: Association rules and deep learning for cryptographic algorithm in privacy preserving data mining. Clust. Comput. 22(1), 119–131 (2019)

    Article  Google Scholar 

  24. Domadiya, N., Rao, U.P.: Privacy preserving distributed association rule mining approach on vertically partitioned healthcare data. Procedia Comp. Sci. 148, 303–312 (2019)

    Article  Google Scholar 

  25. Dwivedi, J.: Various Aspects of Privacy Preserving Data Mining: A Comparative Study. Int J. Eng. Res. Curr. Trends. 1(1) (2019).

  26. Shynu, P. G., Shayan, H. M., Chowdhary, C. L.: A fuzzy based data perturbation technique for privacy preserved data mining. In: 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE) (pp. 1–4). New York: IEEE (2020).

  27. Kiran, A., Vasumathi, D.: Data mining: min–max normalization based data perturbation technique for privacy preservation. In Proceedings of the Third International Conference on Computational Intelligence and Informatics: ICCII 2018 (pp. 723–734). Singapore: Springer (2020).

  28. Sugumaran, V. R., Rajaram, A.: Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs. J. Intell. Fuzzy Syst. (Preprint), 1–16 (2023).

  29. Chamikara, M.A.P., Bertok, P., Liu, D., Camtepe, S., Khalil, I.: Efficient privacy preservation of big data for accurate data mining. Inf. Sci. 527, 420–443 (2020)

    Article  MathSciNet  Google Scholar 

  30. Liu, J., Tian, Y., Zhou, Y., Xiao, Y., Ansari, N.: Privacy preserving distributed data mining based on secure multi-party computation. Comput. Commun. 153, 208–216 (2020)

    Article  Google Scholar 

  31. Kumar, G.S., Premalatha, K., Maheshwari, G.U., Kanna, P.R.: No more privacy Concern: a privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user’s private and sensitive data. Expert Syst. Appl. 234, 121071 (2023)

    Article  Google Scholar 

  32. Paul, M.K., Islam, M.R., Sattar, A.S.: An efficient perturbation approach for multivariate data in sensitive and reliable data mining. J. Inform. Security Appl. 62, 102954 (2021)

    Google Scholar 

  33. Denham, B., Pears, R., Naeem, M.A.: Enhancing random projection with independent and cumulative additive noise for privacy-preserving data stream mining. Expert Syst. Appl. 152, 113380 (2020)

    Article  Google Scholar 

  34. https://archive.ics.uci.edu/ml/datasets/Wholesale%2Bcustomers

  35. https://archive.ics.uci.edu/ml/datasets/Page+Blocks+Classification

  36. Eberhart, R., Kennedy, J.: Particle swarm optimization. In: Proceedings of the IEEE international conference on neural networks (Vol. 4, pp. 1942–1948). Citeseer (1995)

  37. Specht, D.F.: A general regression neural network. IEEE Trans. Neural Netw. 2(6), 568–576 (1991)

    Article  Google Scholar 

  38. Gert, H.: The FastICA package for MATLAB. http://www.cis.hut.fi/projects/ica/fastica/ (2005).

Download references

Acknowledgements

There is no acknowledgement involved in this work.

Funding

No funding is involved in this work.

Author information

Authors and Affiliations

Authors

Contributions

All authors are contributed equally to this work

Corresponding author

Correspondence to Nadella Sunil.

Ethics declarations

Conflict of interests

Conflict of interest is not applicable in this work.

Human and Animal Rights

No violation of Human and Animal Rights is involved.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sunil, N., Narsimha, G. Image-based random rotation for preserving the data in data mining process. SIViP 18, 3893–3902 (2024). https://doi.org/10.1007/s11760-024-03050-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-024-03050-2

Keywords

Navigation