PSV-GWO: Particle Swarm Velocity Aided GWO for Privacy Preservation of Data
DOI:
https://doi.org/10.13052/2245-1439.843Keywords:
Healthcare Data Preservation, Data Restoration, Sanitized Data, Key generation, Modified OptimizationAbstract
Due to the maximum usage of Social Networking Sites (SNS) the number of individuals that are posting their health information online is increasing. The health information of the user’sis disclosed on these sites, where the organization or various individuals can mine that for numerous research and commercial purposes. Because of this sensitive nature of the medical information, the privacy protection is said to be a main focus for the researchers. On analyzing many of the conventional methods, there is an improvement in the sanitization process but still lacks on the restoration of data. Thus, this paper focused on the privacy preservation over the healthcare records. The proposed model is about the enhancement in the sanitization technique that hides the raw information presented by the users. The sanitization process involves the generation of key that created optimally by introducing a new Particle Swarm Velocity aided GWO (PSV-GWO) algorithm. Additionally, the authorized user can restore these sanitized medical data securely. Finally, the traditional algorithms are compared with the proposed model in terms of Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), Crow Search Optimization (CSA) and Adaptive Awareness Probability-based CSA (AAP-CSA) and the outcome is analyzed.
Downloads
References
Li, Y., Bai, C and Chandan Reddy, K. (2016). A distributed ensemble approach for mining healthcare data under privacy constraints, Information Sciences, 330, 245–259.
Ni, L., Li, C., Wang, X., Jiang, H and Yu, J. (2018). DP-MCDBSCAN: Differential Privacy Preserving Multi-Core DBSCAN Clustering for Network User Data, IEEE Access, 6, 21053–21063,
Gao, G., Wan, X., Yao, S., Cui, Z., Zhou C and Sun, X. (2017). Reversible data hiding with contrast enhancement and tamper localization for medical images, Information Sciences, 385–386, 250–265.
Zhang, L., Liu, Y., Wang, R., Fu, X and Lin, Q. (2017). Efficient privacy-preserving classification construction model with differential privacy technology, Journal of Systems Engineering and Electronics, 28(1), 170–178.
Kim, S., Lee, H and DohnChung, Y. (2017). Privacy-preserving data cube for electronic medical records:An experimental evaluation, International Journal of Medical Informatics, 97, 33–42.
Fong, P. K and Weber-Jahnke, J. H. (2012). Privacy Preserving Decision Tree Learning Using Unrealized Data Sets, IEEE Transactions on Knowledge and Data Engineering, 24(2), 353–364.
Poulis, G., Loukides, G., Skiadopoulos, S and Gkoulalas-Divanis, A. (2017). Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraints, Journal of Biomedical Informatics, 65, 76–96.
Xu, L., Jiang, C., Chen, Y., Wang, J and Ren, Y. (2016). A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining, Computer, 49(2), 54–62.
Bhaduri, K., Stefanski, M. D. and Srivastava, A. N. (2011). Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion, IEEE Transactions on Systems, Man, and Cybernetics, PartB (Cybernetics), 41(1), 260–272.
Zhang, N and Zhao, W. (2007). Privacy-Preserving Data Mining Systems, Computer, 40(4), 52–58.
Wang, J., Deng, C and Li, X. (2018). Two Privacy-Preserving Approaches for Publishing Transactional Data Streams, IEEE Access, 6, 2364823658.
Terrovitis, M., Poulis, G., Mamoulis, N and Skiadopoulos, S. (2017). Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajectories, IEEE Transactions on Knowledge and Data Engineering, 29(7),1466–1479.
Ahluwalia, M. V., Gangopadhyay, A., Chen, Z and Yesha, Y. (2017). Target-Based, Privacy Preserving, and Incremental Association Rule Mining, IEEE Transactions on Services Computing, 10(4), 633–645.
Lin, K. P and Chen, M. S. (2011). On the Design and Analysis of the Privacy-Preserving SVM Classifier, IEEE Transactions on Knowledge and Data Engineering, 23(11), 1704–1717.
Fung, B. C. M., Wang, K. and Yu, P. S. (2007). Anonymizing Classification Data for Privacy Preservation, IEEE Transactions on Knowledge and Data Engineering, 19(5), 711–725.
Upadhyay, S., Sharma, C., Sharma, P., Bharadwaj, P., Seeja, K. R. (2016). Privacy preserving data mining with 3-D rotation transformation, Journal of King Saud University – Computer and Information Sciences, Available online 28 November 2016.
BALOGLU, U. B., DEMIR, Y. (2018). Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid Metering Infrastructure Protection, International Journal of Critical Infrastructure Protection, Available online 10 May 2018.
Lin, C. (2016). A reversible data transform algorithm using integer transform for privacy-preserving data mining, Journal of Systems and Software, 117, 104–112.
Dhasarathan, C., Thirumal, V., Ponnurangam, D. (2017). A secure data privacy preservation for on-demand cloud service, Journal of King Saud University – Engineering Sciences, 29(2), 144–150.
Aldeen,Y.A.A. S., Salleh, M.,Aljeroud,Y. (2016). An innovative privacy preserving technique for incremental datasets on cloud computing, Journal of Biomedical Informatics, 62, 107–116.
Marini, F., Walczak, B. (2015). Particle swarm optimization (PSO). A tutorial, Chemometrics and Intelligent Laboratory Systems, 149, pp. 153–165.
Mirjalili, S., Mirjalili, S. M., Lewis, A. (2014). Grey Wolf Optimizer, Advances in Engineering Software, 69, 46–61.
McCal, J. (2005). Genetic algorithms for modelling and optimisation, Journal of Computational and Applied Mathematics, 184(1), 205–222.
Zheng, L. M., Zhang, S. X., Tang, K.S., and Zheng, S. Y. (2017). Differential evolution powered by collective information, Information Sciences, 399, 13–29.
Askarzadeh, A. (2016). A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm, Computers & Structures, 169, 1–12.
Sridhar Mandapati, Dr. Raveendra Babu Bhogapathi and Dr. M. V. P. Chandra Sekhara Rao, (2013). Swarm Optimization Algorithm for Privacy Preserving in Data Mining, IJCSI International Journal of Computer Science Issues, Vol. 10(2), 1694–0784.
Mandala, J., Dr. M. V. P. Chandra Sekhara Rao, (2018). Privacy Preservation of Data Using Crow Search with Adaptive Awareness Probability, in communication.
G. Kalyani, Dr. M. V. P. Chandra Sekhara Rao, (2017). Particle Swarm Intelligence and Impact Factor-Based Privacy Preserving Association Rule Mining for Balancing Data Utility and Knowledge Privacy, Arabian Journal for Science and Engineering, 43(8), 4161–4178.
De Giorgio A., Loscalzo R. M., Ponte M., Padovan A. M., Graceffa G. and Gulotta F. (2016). An innovative mindfulness and educational care approach in an adult patient affected by gastroesophageal reflux: the IARA model, 14(4).
Satish Ramchandra Todmal, Suhas Haribhau Patil. (2015), Optimal Image Watermarking using Hybrid Optimization Algorithm, International Journal of Computer Vision and Image Processing (IJCVIP), 5(1), 27–47.