Reference Hub5
Data Mining-Based Privacy Preservation Technique for Medical Dataset Over Horizontal Partitioned

Data Mining-Based Privacy Preservation Technique for Medical Dataset Over Horizontal Partitioned

Shivlal Mewada
Copyright: © 2021 |Volume: 12 |Issue: 5 |Pages: 17
ISSN: 1947-315X|EISSN: 1947-3168|EISBN13: 9781799867500|DOI: 10.4018/IJEHMC.20210901.oa4
Cite Article Cite Article

MLA

Mewada, Shivlal. "Data Mining-Based Privacy Preservation Technique for Medical Dataset Over Horizontal Partitioned." IJEHMC vol.12, no.5 2021: pp.50-66. http://doi.org/10.4018/IJEHMC.20210901.oa4

APA

Mewada, S. (2021). Data Mining-Based Privacy Preservation Technique for Medical Dataset Over Horizontal Partitioned. International Journal of E-Health and Medical Communications (IJEHMC), 12(5), 50-66. http://doi.org/10.4018/IJEHMC.20210901.oa4

Chicago

Mewada, Shivlal. "Data Mining-Based Privacy Preservation Technique for Medical Dataset Over Horizontal Partitioned," International Journal of E-Health and Medical Communications (IJEHMC) 12, no.5: 50-66. http://doi.org/10.4018/IJEHMC.20210901.oa4

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The valuable information is extracted through data mining techniques. Recently, privacy preserving data mining techniques are widely adopted for securing and protecting the information and data. These techniques convert the original dataset into protected dataset through swapping, modification, and deletion functions. This technique works in two steps. In the first step, cloud computing considers a service platform to determine the optimum horizontal partitioning in given data. In this work, K-Means++ algorithm is implemented to determine the horizontal partitioning on the cloud platform without disclosing the cluster centers information. The second steps contain data protection and recover phases. In the second step, noise is incorporated in the database to maintain the privacy and semantic of the data. Moreover, the seed function is used for protecting the original databases. The effectiveness of the proposed technique is evaluated using several benchmark medical datasets. The results are evaluated using encryption time, execution time, accuracy, and f-measure parameters.