Privacy Preserving Data Mining in Electronic Health Record using Kanonymity and Decision Tree
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 7
Abstract
In this paper, we present an accurate and efficient privacy preserving data mining technique in Electronic Health Record (EHR) by using k –anonymity and decision tree C4.5 that is useful to generate pattern for medical research or any clinical trials. It is analyzed that anonymization offers better privacy rather than other privacy preserving method like that randomization, cryptography, perturbation and encryption methods. K- Anonymity is useful for prevention of identity of patient in medical research; it is useful to avoid linking attack using suppression and generalization process. The objective of this research work is to propose and implement privacy preserving data mining approach, which best suits with EHR systems without impeding the flow of control. The data stored in EHR system is highly confidential which contains information about patient disease. To ensure confidentiality, we are using anonymization of identity revealing attribute before publishing it for other utility purpose. The experimental results show the validity of the proposed approach. Our approach is useful to preserve utility and privacy in healthcare datasets.
Authors and Affiliations
Anvita Srivastava , Gaurav Srivastava
A SURVEY ON CYBER TERRORISM
Cyber terrorism is a major issue by which an individual or group of people use digitalized method to attack physically or attack on any information for their various reasons. Recent years have seen a rapid growth in the...
Privacy Preserving Based on PCA Transformation Using Data Perturbation Technique
Maintain confidentiality, privacy and security research in data mining (PPDM) is one of the biggest trends. Recent advances in data collection, data dissemination and related technologies have inaugurated a new era of re...
Concept-Based Document Similarity Based on Suffix Tree Document
Document clustering has been studied as a post retrieval document visualization technique to provide an intuitive navigation and browsing mechanism by organizing documents into groups and each group represents a differen...
Computer Aided Music Generation Using Genetic Algorithm and Its Potential Applications
Music speaks what cannot be expressed, soothes the mind and gives it rest, heals the heart and makes is whole. Not everyone is gifted with a good voice but almost everyone has good ears when it comes to pleasant music. T...
Preserving Privacy for Access Policies for Secure Data Storage in Clouds
Cloud computing is well known for its ubiquitous behavior, as the users can store and avail the data from cloud at any point of time irrespective of the location through internet. In the current era, cloud computing is r...