{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T03:10:03Z","timestamp":1746846603064,"version":"3.40.5"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100006261","name":"Taif University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01948-3","type":"journal-article","created":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T04:14:57Z","timestamp":1744863297000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A technique for improving healthcare privacy by applying principal component analysis"],"prefix":"10.1007","volume":"18","author":[{"given":"Ritu","family":"Ratra","sequence":"first","affiliation":[]},{"given":"Preeti","family":"Gulia","sequence":"additional","affiliation":[]},{"given":"Nasib Singh","family":"Gill","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3715-3882","authenticated-orcid":false,"given":"Piyush Kumar","family":"Shukla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1612-107X","authenticated-orcid":false,"given":"Mohamed M.","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Fayez","family":"Althobaiti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,17]]},"reference":[{"issue":"5","key":"1948_CR1","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.3390\/ijerph17051612","volume":"17","author":"A Pika","year":"2020","unstructured":"Pika A, Wynn MT, Budiono S, ter Hofstede AHM, van der Aalst WMP, Reijers HA (2020) Privacy-preserving process mining in healthcare. Int J Environ Res Public Health 17(5):1612. https:\/\/doi.org\/10.3390\/ijerph17051612","journal-title":"Int J Environ Res Public Health"},{"issue":"11","key":"1948_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.14445\/22315381\/IJETT-V68I11P207","volume":"68","author":"R Ratra","year":"2020","unstructured":"Ratra R, Gulia P (2020) Privacy preserving data mining: techniques and algorithms. Int J Eng Trends Technol 68(11):56\u201362. https:\/\/doi.org\/10.14445\/22315381\/IJETT-V68I11P207","journal-title":"Int J Eng Trends Technol"},{"issue":"6","key":"1948_CR3","first-page":"137","volume":"21","author":"A Altalhi","year":"2021","unstructured":"Altalhi A, Al-Saedi M, Alsuwat H, Alsuwat E (2021) Privacy-preserving in the context of data mining and deep learning. Int J Comput Sci Netw Secur 21(6):137\u2013142","journal-title":"Int J Comput Sci Netw Secur"},{"key":"1948_CR4","doi-asserted-by":"crossref","unstructured":"Shelke S, Bhagat B (2015) Techniques for privacy preservation in data mining. Int J Eng Res 4(10)","DOI":"10.17577\/IJERTV4IS100473"},{"key":"1948_CR5","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1016\/j.proenv.2012.01.432","volume":"12","author":"X Qi","year":"2012","unstructured":"Qi X, Zong M (2012) An overview of privacy preserving data mining. Procedia Environ Sci 12:1341\u20131347","journal-title":"Procedia Environ Sci"},{"key":"1948_CR6","doi-asserted-by":"crossref","unstructured":"Malik MB, Ghazi MA, Ali R (2012) Privacy preserving data mining techniques: current scenario and future prospects. In 2012 third international conference on computer and communication technology, IEEE, pp. 26\u201332","DOI":"10.1109\/ICCCT.2012.15"},{"key":"1948_CR7","doi-asserted-by":"crossref","unstructured":"Ratra R, Gulia P, Gill NS (2022) Evaluation of re-identification risk using anonymization and differential privacy in healthcare. Int J Adv Comput Sci Appl 13(2)","DOI":"10.14569\/IJACSA.2022.0130266"},{"issue":"5","key":"1948_CR8","doi-asserted-by":"publisher","first-page":"373","DOI":"10.3390\/e20050373","volume":"20","author":"C Eyupoglu","year":"2018","unstructured":"Eyupoglu C, Aydin MA, Zaim AH, Sertbas A (2018) An efficient big data anonymization algorithm based on chaos and perturbation techniques. Entropy 20(5):373","journal-title":"Entropy"},{"key":"1948_CR9","unstructured":"Keyvanpour M, Moradi SS (2011) Classification and evaluation the privacy preserving data mining techniques by using a data modification-based framework. ArXiv Prepr. ArXiv11051945."},{"issue":"1","key":"1948_CR10","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K Liu","year":"2005","unstructured":"Liu K, Kargupta H, Ryan J (2005) Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans Knowl Data Eng 18(1):92\u2013106","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"1948_CR11","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1186\/s40064-015-1481-x","volume":"4","author":"YAAS Aldeen","year":"2015","unstructured":"Aldeen YAAS, Salleh M, Razzaque MA (2015) A comprehensive review on privacy preserving data mining. Springerplus 4(1):694. https:\/\/doi.org\/10.1186\/s40064-015-1481-x","journal-title":"Springerplus"},{"key":"1948_CR12","doi-asserted-by":"crossref","unstructured":"Paul MK, Islam MR (2022) Enhancing the performance of 3d rotation perturbation in privacy preserving data mining using correlation based feature selection. In: Proceedings of the international conference on big data, IoT, and machine learning:\u00a0BIM 2021. Springer Singapore, pp 205\u2013215","DOI":"10.1007\/978-981-16-6636-0_17"},{"key":"1948_CR13","doi-asserted-by":"crossref","unstructured":"Li C, Palanisamy B, Krishnamurthy P (2018) Reversible data perturbation techniques for multi-level privacy-preserving data publication. In International Conference on Big Data, Springer, pp. 26\u201342.","DOI":"10.1007\/978-3-319-94301-5_3"},{"issue":"12","key":"1948_CR14","first-page":"1","volume":"31","author":"N Gayathri Devi","year":"2020","unstructured":"Gayathri Devi N, Manikandan K (2020) Improved perturbation technique privacy-preserving rotation-based condensation algorithm for privacy preserving in big data stream using Internet of Things. Trans Emerg Telecommun Technol 31(12):1\u201312","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1948_CR15","doi-asserted-by":"crossref","unstructured":"Thuraisingham B, Kantarcioglu M, Liu L (2006) The applicability of the perturbation model-based privacy preserving data mining for real-world data. In Sixth IEEE International Conference on Data Mining-Workshops (ICDMW\u201906), IEEE, pp. 507\u2013512.","DOI":"10.1109\/ICDMW.2006.155"},{"issue":"6","key":"1948_CR16","doi-asserted-by":"publisher","first-page":"3602","DOI":"10.1016\/j.jksuci.2020.06.010","volume":"34","author":"T Javid","year":"2022","unstructured":"Javid T, Gupta MK, Gupta A (2022) A hybrid-security model for privacy-enhanced distributed data mining. J King Saud Univ Comput Inf Sci 34(6):3602\u20133614","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1948_CR17","doi-asserted-by":"publisher","unstructured":"Siang D, Othman S, Raja Mohd Radzi RZ (2018) Comparative study on perturbation techniques in privacy preserving data mining on two numeric datasets. Int J Innov Comput 8. https:\/\/doi.org\/10.11113\/ijic.v8n1.161.","DOI":"10.11113\/ijic.v8n1.161"},{"key":"1948_CR18","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1016\/j.inffus.2021.04.017","volume":"76","author":"NJ Gati","year":"2021","unstructured":"Gati NJ, Yang LT, Feng J, Nie X, Ren Z, Tarus SK (2021) Differentially private data fusion and deep learning framework for cyber\u2013physical\u2013social systems: state-of-the-art and perspectives. Inf Fusion 76:298\u2013314. https:\/\/doi.org\/10.1016\/j.inffus.2021.04.017","journal-title":"Inf Fusion"},{"key":"1948_CR19","doi-asserted-by":"publisher","first-page":"101656","DOI":"10.1109\/ACCESS.2022.3208715","volume":"10","author":"Y Sei","year":"2022","unstructured":"Sei Y, Onesimu JA, Ohsuga A (2022) Machine learning model generation with copula-based synthetic dataset for local differentially private numerical data. IEEE Access 10:101656\u2013101671. https:\/\/doi.org\/10.1109\/ACCESS.2022.3208715","journal-title":"IEEE Access"},{"key":"1948_CR20","unstructured":"Gulia P (2028) Privacy preserving data mining of vertically partitioned data in distributed environment-an experimental analysis. J Theor Appl Inf Technol 96(10)"},{"key":"1948_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/5094830","volume":"2022","author":"X Yu","year":"2022","unstructured":"Yu X, Zhao W, Tang D, Liang K (2022) \u201cMahanana.\u201d Secur Commun Netw 2022:1\u201312. https:\/\/doi.org\/10.1155\/2022\/5094830","journal-title":"Secur Commun Netw"},{"issue":"5","key":"1948_CR22","first-page":"2451","volume":"20","author":"V Sharma","year":"2021","unstructured":"Sharma V, Soni D, Srivastava D, Kumar P (2021) A novel hybrid approach of suppression and randomization for privacy preserving data mining. Ilk Online 20(5):2451","journal-title":"Ilk Online"},{"key":"1948_CR23","doi-asserted-by":"publisher","unstructured":"Gokulnath C, Priyan MK, Balan EV, Rama Prabha KP, Jeyanthi R (2015) Preservation of privacy in data mining by using PCA based perturbation technique. In 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Chennai: IEEE, pp. 202\u2013206. https:\/\/doi.org\/10.1109\/ICSTM.2015.7225414.","DOI":"10.1109\/ICSTM.2015.7225414"},{"key":"1948_CR24","unstructured":"Fan X, Wang G, Chen K, He X, Xu W (2021) Ppca: privacy-preserving principal component analysis using secure multiparty computation (mpc). ArXiv Prepr. ArXiv210507612."},{"key":"1948_CR25","doi-asserted-by":"publisher","first-page":"6402274","DOI":"10.1155\/2022\/6402274","volume":"2022","author":"R Ratra","year":"2022","unstructured":"Ratra R, Gulia P, Gill NS, Chatterjee JM (2022) Big data privacy preservation using principal component analysis and random projection in healthcare. Math Probl Eng 2022:6402274. https:\/\/doi.org\/10.1155\/2022\/6402274","journal-title":"Math Probl Eng"},{"issue":"3","key":"1948_CR26","doi-asserted-by":"publisher","first-page":"156","DOI":"10.4258\/hir.2016.22.3.156","volume":"22","author":"DV Dimitrov","year":"2016","unstructured":"Dimitrov DV (2016) Medical internet of things and big data in healthcare. Healthc Inform Res 22(3):156\u2013163. https:\/\/doi.org\/10.4258\/hir.2016.22.3.156","journal-title":"Healthc Inform Res"},{"key":"1948_CR27","doi-asserted-by":"publisher","unstructured":"Marques J, Bernardino J (2020) Analysis of data anonymization techniques. In Proceedings of the 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, Budapest, Hungary: SCITEPRESS - Science and Technology Publications, pp. 235\u2013241. https:\/\/doi.org\/10.5220\/0010142302350241.","DOI":"10.5220\/0010142302350241"},{"issue":"6","key":"1948_CR28","doi-asserted-by":"publisher","first-page":"2343","DOI":"10.1016\/j.jksuci.2020.10.015","volume":"34","author":"D Ahamad","year":"2022","unstructured":"Ahamad D, Alam Hameed S, Akhtar M (2022) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J King Saud Univ Comput Inf Sci 34(6):2343\u20132358. https:\/\/doi.org\/10.1016\/j.jksuci.2020.10.015","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"4","key":"1948_CR29","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1016\/j.jksuci.2019.08.006","volume":"34","author":"BB Mehta","year":"2022","unstructured":"Mehta BB, Rao UP (2022) Improved L-diversity: scalable anonymization approach for privacy preserving big data publishing. J King Saud Univ Comput Inf Sci 34(4):1423\u20131430. https:\/\/doi.org\/10.1016\/j.jksuci.2019.08.006","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"3","key":"1948_CR30","first-page":"830","volume":"7","author":"S Kumaraswamy","year":"2017","unstructured":"Kumaraswamy S, Manjula SH, Venugopal KR (2017) Secure cloud based privacy preserving dataminning platform. Indones J Electr Eng Comput Sci 7(3):830","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"1948_CR31","doi-asserted-by":"crossref","unstructured":"Banu RV, Nagaveni N (2009) Preservation of data privacy using PCA based transformation. In 2009 International Conference on Advances in Recent Technologies in Communication and Computing, IEEE, pp. 439\u2013443.","DOI":"10.1109\/ARTCom.2009.159"},{"key":"1948_CR32","first-page":"5","volume":"1","author":"S Patel","year":"2014","unstructured":"Patel S, Shah G, Patel A (2014) Techniques of data perturbation for privacy preserving data mining. Int J Advent Res Comput Electron 1:5\u201310","journal-title":"Int J Advent Res Comput Electron"},{"issue":"2","key":"1948_CR33","doi-asserted-by":"publisher","first-page":"152","DOI":"10.22452\/mjcs.vol33no2.5","volume":"33","author":"A Dutt","year":"2020","unstructured":"Dutt A, Ismail MA (2020) A partition-based feature selection method for mixed data: a filter approach. Malays J Comput Sci 33(2):152\u2013169","journal-title":"Malays J Comput Sci"},{"issue":"22","key":"1948_CR34","doi-asserted-by":"publisher","first-page":"15091","DOI":"10.1007\/s00521-021-06406-8","volume":"33","author":"EO Abiodun","year":"2021","unstructured":"Abiodun EO, Alabdulatif A, Abiodun OI, Alawida M, Alabdulatif A, Alkhawaldeh RS (2021) A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities. Neural Comput Appl 33(22):15091\u201315118. https:\/\/doi.org\/10.1007\/s00521-021-06406-8","journal-title":"Neural Comput Appl"},{"issue":"8","key":"1948_CR35","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"H Peng","year":"2005","unstructured":"Peng H, Long F, Ding C (2005) Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans Pattern Anal Mach Intell 27(8):1226\u20131238. https:\/\/doi.org\/10.1109\/TPAMI.2005.159","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1948_CR36","doi-asserted-by":"crossref","unstructured":"Nasiri N, Keyvanpour M (2020) Classification and evaluation of privacy preserving data mining methods. In 2020 11th International Conference on Information and Knowledge Technology (IKT), IEEE, pp. 17\u201322.","DOI":"10.1109\/IKT51791.2020.9345620"},{"issue":"2","key":"1948_CR37","doi-asserted-by":"publisher","first-page":"97","DOI":"10.22452\/mjcs.vol32no2.2","volume":"32","author":"S Ghosh","year":"2019","unstructured":"Ghosh S, Sadhu S, Biswas S, Sarkar D, Sarkar PP (2019) A comparison between different classifiers for tennis match result prediction. Malays J Comput Sci 32(2):97\u2013111. https:\/\/doi.org\/10.22452\/mjcs.vol32no2.2","journal-title":"Malays J Comput Sci"},{"issue":"4","key":"1948_CR38","doi-asserted-by":"publisher","first-page":"355","DOI":"10.22452\/mjcs.vol34no4.3","volume":"34","author":"J-Y Yeh","year":"2021","unstructured":"Yeh J-Y, Tsai C-J, Hsu T-Y, Lin J-Y, Cheng P-C (2021) Feature selection and classification integrated method for identifying cited text spans for citances on imbalanced data. Malays J Comput Sci 34(4):355\u2013373","journal-title":"Malays J Comput Sci"},{"key":"1948_CR39","doi-asserted-by":"publisher","unstructured":"Mohd F, Abdul Jalil M, Mohamad Noor NM, Abu Bakar Z, Abdullah Z (2018) Enhancement of bayesian model with relevance feedback for improving diagnostic model. Malays J Comput Sci 1\u201314, https:\/\/doi.org\/10.22452\/mjcs.sp2018no1.1.","DOI":"10.22452\/mjcs.sp2018no1.1"},{"key":"1948_CR40","doi-asserted-by":"publisher","unstructured":"Murugesan S, Bhuvaneswaran RS, Khanna Nehemiah H, Keerthana Sankari S, Nancy Jane Y (2021) Feature selection and classification of clinical datasets using bioinspired algorithms and super learner. Comput Math Methods Med 2021: 1\u201318, https:\/\/doi.org\/10.1155\/2021\/6662420.","DOI":"10.1155\/2021\/6662420"},{"key":"1948_CR41","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1016\/j.jbusres.2019.05.005","volume":"122","author":"J Wieringa","year":"2021","unstructured":"Wieringa J, Kannan PK, Ma X, Reutterer T, Risselada H, Skiera B (2021) Data analytics in a privacy-concerned world. J Bus Res 122:915\u2013925","journal-title":"J Bus Res"},{"key":"1948_CR42","unstructured":"Find Open Datasets and Machine Learning Projects | Kaggle. https:\/\/www.kaggle.com\/datasets. Accessed 31 May 2022."},{"issue":"2","key":"1948_CR43","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/logistics6020035","volume":"6","author":"TLJ Phan","year":"2022","unstructured":"Phan TLJ, Gehrhardt I, Heik D, Bahrpeyma F, Reichelt D (2022) A systematic mapping study on machine learning techniques applied for condition monitoring and predictive maintenance in the manufacturing sector. Logistics 6(2):2. https:\/\/doi.org\/10.3390\/logistics6020035","journal-title":"Logistics"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01948-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01948-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01948-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:33:14Z","timestamp":1746844394000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01948-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,17]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1948"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01948-3","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,4,17]]},"assertion":[{"value":"1 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Use of AI tools declaration"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"151"}}