PSV-GWO: Particle Swarm Velocity Aided GWO for Privacy Preservation of Data

Authors

  • Jyothi Mandala Research Scholar, ANU, Guntur, Andhra Pradesh 522019, India and Assistant Professor, GMRIT, Rajam, Andhra Pradesh 532127, India
  • Dr. M. V. P. Chandra Sekhara Rao Professor, RVR & JC College of Engineering, Guntur, Andhra Pradesh 522019, India

DOI:

https://doi.org/10.13052/2245-1439.843

Keywords:

Healthcare Data Preservation, Data Restoration, Sanitized Data, Key generation, Modified Optimization

Abstract

Due to the maximum usage of Social Networking Sites (SNS) the number of individuals that are posting their health information online is increasing. The health information of the user’sis disclosed on these sites, where the organization or various individuals can mine that for numerous research and commercial purposes. Because of this sensitive nature of the medical information, the privacy protection is said to be a main focus for the researchers. On analyzing many of the conventional methods, there is an improvement in the sanitization process but still lacks on the restoration of data. Thus, this paper focused on the privacy preservation over the healthcare records. The proposed model is about the enhancement in the sanitization technique that hides the raw information presented by the users. The sanitization process involves the generation of key that created optimally by introducing a new Particle Swarm Velocity aided GWO (PSV-GWO) algorithm. Additionally, the authorized user can restore these sanitized medical data securely. Finally, the traditional algorithms are compared with the proposed model in terms of Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), Crow Search Optimization (CSA) and Adaptive Awareness Probability-based CSA (AAP-CSA) and the outcome is analyzed.

 

Downloads

Download data is not yet available.

Author Biographies

Jyothi Mandala, Research Scholar, ANU, Guntur, Andhra Pradesh 522019, India and Assistant Professor, GMRIT, Rajam, Andhra Pradesh 532127, India

Jyothi Mandala received her B.Tech degree in Computer Science and Information Technology from AITAM College, Tekkali, India and M.Tech degree in Computer Science and Engineering from JNTUK, Kakinada, India. Present she is pursuing her Ph.D. in the area of Privacy Preserving Data. She has 12 years of teaching experience. Currently she is working as Assistant professor in Information Technology Department at GMRIT, Rajam. Her areas of interest are Information Security and Data Mining.

Dr. M. V. P. Chandra Sekhara Rao, Professor, RVR & JC College of Engineering, Guntur, Andhra Pradesh 522019, India

Dr. M. V. P. Chandra Sekhara Rao received his M.Tech degree in Computer Science and Engineering from JNTUK, Kakinada, India and Ph.D from JNTUH, Hyderabad in 2012. He has nearly 22 years of teaching experience. Currently he is working as professor in Computer Science Engineering Department at RVR & JC College of Engineering, Guntur. His areas of interest are Data Warehousing and Data Mining.

References

Li, Y., Bai, C and Chandan Reddy, K. (2016). A distributed ensemble approach for mining healthcare data under privacy constraints, Information Sciences, 330, 245–259.

Ni, L., Li, C., Wang, X., Jiang, H and Yu, J. (2018). DP-MCDBSCAN: Differential Privacy Preserving Multi-Core DBSCAN Clustering for Network User Data, IEEE Access, 6, 21053–21063,

Gao, G., Wan, X., Yao, S., Cui, Z., Zhou C and Sun, X. (2017). Reversible data hiding with contrast enhancement and tamper localization for medical images, Information Sciences, 385–386, 250–265.

Zhang, L., Liu, Y., Wang, R., Fu, X and Lin, Q. (2017). Efficient privacy-preserving classification construction model with differential privacy technology, Journal of Systems Engineering and Electronics, 28(1), 170–178.

Kim, S., Lee, H and DohnChung, Y. (2017). Privacy-preserving data cube for electronic medical records:An experimental evaluation, International Journal of Medical Informatics, 97, 33–42.

Fong, P. K and Weber-Jahnke, J. H. (2012). Privacy Preserving Decision Tree Learning Using Unrealized Data Sets, IEEE Transactions on Knowledge and Data Engineering, 24(2), 353–364.

Poulis, G., Loukides, G., Skiadopoulos, S and Gkoulalas-Divanis, A. (2017). Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraints, Journal of Biomedical Informatics, 65, 76–96.

Xu, L., Jiang, C., Chen, Y., Wang, J and Ren, Y. (2016). A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining, Computer, 49(2), 54–62.

Bhaduri, K., Stefanski, M. D. and Srivastava, A. N. (2011). Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion, IEEE Transactions on Systems, Man, and Cybernetics, PartB (Cybernetics), 41(1), 260–272.

Zhang, N and Zhao, W. (2007). Privacy-Preserving Data Mining Systems, Computer, 40(4), 52–58.

Wang, J., Deng, C and Li, X. (2018). Two Privacy-Preserving Approaches for Publishing Transactional Data Streams, IEEE Access, 6, 2364823658.

Terrovitis, M., Poulis, G., Mamoulis, N and Skiadopoulos, S. (2017). Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajectories, IEEE Transactions on Knowledge and Data Engineering, 29(7),1466–1479.

Ahluwalia, M. V., Gangopadhyay, A., Chen, Z and Yesha, Y. (2017). Target-Based, Privacy Preserving, and Incremental Association Rule Mining, IEEE Transactions on Services Computing, 10(4), 633–645.

Lin, K. P and Chen, M. S. (2011). On the Design and Analysis of the Privacy-Preserving SVM Classifier, IEEE Transactions on Knowledge and Data Engineering, 23(11), 1704–1717.

Fung, B. C. M., Wang, K. and Yu, P. S. (2007). Anonymizing Classification Data for Privacy Preservation, IEEE Transactions on Knowledge and Data Engineering, 19(5), 711–725.

Upadhyay, S., Sharma, C., Sharma, P., Bharadwaj, P., Seeja, K. R. (2016). Privacy preserving data mining with 3-D rotation transformation, Journal of King Saud University – Computer and Information Sciences, Available online 28 November 2016.

BALOGLU, U. B., DEMIR, Y. (2018). Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid Metering Infrastructure Protection, International Journal of Critical Infrastructure Protection, Available online 10 May 2018.

Lin, C. (2016). A reversible data transform algorithm using integer transform for privacy-preserving data mining, Journal of Systems and Software, 117, 104–112.

Dhasarathan, C., Thirumal, V., Ponnurangam, D. (2017). A secure data privacy preservation for on-demand cloud service, Journal of King Saud University – Engineering Sciences, 29(2), 144–150.

Aldeen,Y.A.A. S., Salleh, M.,Aljeroud,Y. (2016). An innovative privacy preserving technique for incremental datasets on cloud computing, Journal of Biomedical Informatics, 62, 107–116.

Marini, F., Walczak, B. (2015). Particle swarm optimization (PSO). A tutorial, Chemometrics and Intelligent Laboratory Systems, 149, pp. 153–165.

Mirjalili, S., Mirjalili, S. M., Lewis, A. (2014). Grey Wolf Optimizer, Advances in Engineering Software, 69, 46–61.

McCal, J. (2005). Genetic algorithms for modelling and optimisation, Journal of Computational and Applied Mathematics, 184(1), 205–222.

Zheng, L. M., Zhang, S. X., Tang, K.S., and Zheng, S. Y. (2017). Differential evolution powered by collective information, Information Sciences, 399, 13–29.

Askarzadeh, A. (2016). A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm, Computers & Structures, 169, 1–12.

Sridhar Mandapati, Dr. Raveendra Babu Bhogapathi and Dr. M. V. P. Chandra Sekhara Rao, (2013). Swarm Optimization Algorithm for Privacy Preserving in Data Mining, IJCSI International Journal of Computer Science Issues, Vol. 10(2), 1694–0784.

Mandala, J., Dr. M. V. P. Chandra Sekhara Rao, (2018). Privacy Preservation of Data Using Crow Search with Adaptive Awareness Probability, in communication.

G. Kalyani, Dr. M. V. P. Chandra Sekhara Rao, (2017). Particle Swarm Intelligence and Impact Factor-Based Privacy Preserving Association Rule Mining for Balancing Data Utility and Knowledge Privacy, Arabian Journal for Science and Engineering, 43(8), 4161–4178.

De Giorgio A., Loscalzo R. M., Ponte M., Padovan A. M., Graceffa G. and Gulotta F. (2016). An innovative mindfulness and educational care approach in an adult patient affected by gastroesophageal reflux: the IARA model, 14(4).

Satish Ramchandra Todmal, Suhas Haribhau Patil. (2015), Optimal Image Watermarking using Hybrid Optimization Algorithm, International Journal of Computer Vision and Image Processing (IJCVIP), 5(1), 27–47.

Downloads

Published

2018-06-09

How to Cite

1.
Mandala J, Rao DMVPCS. PSV-GWO: Particle Swarm Velocity Aided GWO for Privacy Preservation of Data. JCSANDM [Internet]. 2018 Jun. 9 [cited 2024 May 13];8(4):439-66. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5363

Issue

Section

Articles