{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T05:25:53Z","timestamp":1744953953858},"reference-count":32,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7,1]]},"abstract":"<p>Government agencies, business enterprises and non-profit organizations are searching for innovative methods to collect and analyze data about individuals or businesses to support their decision making processes. Data mining techniques are able to derive sensitive knowledge from unclassified data, causing a severe threat to privacy. The authors provide a promising solution to address the demand for privacy preservation in clustering analysis. They propose a novel dimensionality expansion based data privacy preservation technique using multi-layer artificial neural network. By applying this idea, the authors can project a low dimensional data into a high dimensional space to enhance the privacy level. Clustering was done using K-means and the results show that privacy level and the nature of data were very much preserved even after this transformation. The results arrived at were significant and the proposed method transformed the data better than the classical Geometric data transformation based methods.<\/p>","DOI":"10.4018\/jiit.2012070102","type":"journal-article","created":{"date-parts":[[2012,12,11]],"date-time":"2012-12-11T16:35:26Z","timestamp":1355243726000},"page":"17-31","source":"Crossref","is-referenced-by-count":12,"title":["Low Dimensional Data Privacy Preservation Using Multi Layer Artificial Neural Network"],"prefix":"10.4018","volume":"8","author":[{"given":"R.","family":"VidyaBanu","sequence":"first","affiliation":[{"name":"Sri Krishna College of Engineering and Technology, India"}]},{"given":"N.","family":"Nagaveni","sequence":"additional","affiliation":[{"name":"Coimbatore Institute of Technology, India"}]}],"member":"2432","reference":[{"key":"jiit.2012070102-0","doi-asserted-by":"crossref","unstructured":"Agarwal, R., & Srikant, R. (2000). Privacy-preserving data mining. In Proceedings of the ACM SIGMOD International Conference on Management of Data, Dallas, TX (pp. 439-450).","DOI":"10.1145\/335191.335438"},{"issue":"1","key":"jiit.2012070102-1","doi-asserted-by":"crossref","first-page":"68","DOI":"10.4018\/jiit.2006010104","article-title":"Rapid privacy preserving algorithm for large databases.","volume":"2","author":"K.Anbumani","year":"2006","journal-title":"International Journal of Intelligent Information Technologies"},{"issue":"1","key":"jiit.2012070102-2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.4018\/jiit.2005010104","article-title":"PPDAM: Privacy-preserving distributed association-rule-mining algorithm.","volume":"1","author":"M. Z.Ashrafi","year":"2005","journal-title":"International Journal of Intelligent Information Technologies"},{"key":"jiit.2012070102-3","unstructured":"Beale, M. H., Hagan, M. T., & Demuth, H. B. (2011). R2011b Documentation -Matlab help pages of neural network toolbox. Retrieved from http:\/\/www.mathworks.com\/help\/pdf_doc\/nnet\/nnet_ug.pdf"},{"key":"jiit.2012070102-4","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-0-387-70992-5_8","article-title":"A survey of quantification of privacy preserving data mining algorithms","author":"E.Bertino","year":"2008","journal-title":"Privacy-preserving data mining"},{"key":"jiit.2012070102-5","doi-asserted-by":"crossref","unstructured":"Cano, I., Ladra, S., & Torra, V. (2010). Evaluation of information loss for privacy preserving data mining through comparison of fuzzy partitions. In Proceedings of the IEEE International Conference on Fuzzy Systems (pp. 1-8).","DOI":"10.1109\/FUZZY.2010.5584186"},{"issue":"4","key":"jiit.2012070102-6","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1016\/j.ins.2010.10.008","article-title":"A time-efficient pattern reduction algorithm for k-means clustering.","volume":"181","author":"M. C.Chiang","year":"2011","journal-title":"Information Sciences"},{"key":"jiit.2012070102-7","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/978-0-387-70992-5_5","article-title":"K-Anonymous data mining: A survey","author":"V.Ciriani","year":"2008","journal-title":"Advances in database systems"},{"issue":"3","key":"jiit.2012070102-8","doi-asserted-by":"crossref","first-page":"41","DOI":"10.4018\/jiit.2011070104","article-title":"Software effort estimation: Harmonizing algorithms and domain knowledge in an integrated data mining approach.","volume":"7","author":"J. D.Deng","year":"2011","journal-title":"International Journal of Intelligent Information Technologies"},{"issue":"6","key":"jiit.2012070102-9","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1016\/j.datak.2008.12.001","article-title":"Privacy-preserving data publishing for cluster Analysis.","volume":"68","author":"B. C. M.Fung","year":"2009","journal-title":"Data & Knowledge Engineering"},{"issue":"2-4","key":"jiit.2012070102-10","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1504\/IJCAT.2009.026596","article-title":"A novel framework for optimised privacy preserving data mining using the innovative desultory technique.","volume":"35","author":"J.Indumathi","year":"2009","journal-title":"International Journal of Computer Applications in Technology"},{"key":"jiit.2012070102-11","unstructured":"Jung, K., & Lee, C. (2000). Dimension expansion of neural networks. In Proceedings of the Geoscience and Remote Sensing Symposium (Vol. 2, pp. 678-680)."},{"issue":"4","key":"jiit.2012070102-12","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1504\/IJICS.2008.022488","article-title":"Privacy-preserving data mining in the malicious model.","volume":"2","author":"M.Kantarcioglu","year":"2008","journal-title":"International Journal of Information and Computer Security"},{"issue":"1","key":"jiit.2012070102-13","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1504\/IJBIDM.2010.030299","article-title":"Cluster analysis on time series gene expression data.","volume":"5","author":"H. C.Kuo","year":"2010","journal-title":"International Journal of Business Intelligence and Data Mining"},{"issue":"1","key":"jiit.2012070102-14","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TKDE.2006.14","article-title":"Random projection-based multiplicative data perturbation for privacy preserving distributed data mining.","volume":"18","author":"K.Liu","year":"2006","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"jiit.2012070102-15","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., & Venkitasubramaniam, M. (2006). l-Diversity: Privacy beyond k-anonymity. In Proceedings of the 22th International Conference on Data Engineering (p. 24).","DOI":"10.1109\/ICDE.2006.1"},{"issue":"1","key":"jiit.2012070102-16","doi-asserted-by":"crossref","first-page":"26","DOI":"10.4018\/ijiit.2012010103","article-title":"Intelligent decision support system for osteoporosis prediction.","volume":"8","author":"W.Moudani","year":"2012","journal-title":"International Journal of Intelligent Information Technologies"},{"key":"jiit.2012070102-17","unstructured":"Oliveira, S. R. M., & Zaiane, O. R. (2003). Privacy preserving clustering by data transformation. In Proceedings of the 18th Brazilian Symposium on Databases, Manaus, Brazil (pp. 304-318)."},{"issue":"1","key":"jiit.2012070102-18","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.cose.2006.08.003","article-title":"A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration.","volume":"26","author":"S. R. M.Oliveira","year":"2007","journal-title":"Computers & Security"},{"issue":"1","key":"jiit.2012070102-19","doi-asserted-by":"crossref","first-page":"33","DOI":"10.4018\/jiit.2011010103","article-title":"Combining supervised learning techniques to key-phrase extraction for biomedical full-text.","volume":"7","author":"Y.Qi","year":"2011","journal-title":"International Journal of Intelligent Information Technologies"},{"issue":"4","key":"jiit.2012070102-20","doi-asserted-by":"crossref","first-page":"30","DOI":"10.4018\/jiit.2010100103","article-title":"Collusion-free privacy preserving data mining.","volume":"6","author":"M.Rajalakshmi","year":"2010","journal-title":"International Journal of Intelligent Information Technologies"},{"issue":"12","key":"jiit.2012070102-21","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1109\/TKDE.2009.39","article-title":"Privacy-preserving tuple matching in distributed databases.","volume":"21","author":"Y.Sang","year":"2009","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"jiit.2012070102-22","doi-asserted-by":"crossref","first-page":"54","DOI":"10.4018\/jiit.2011070105","article-title":"An ontology based model for document clustering.","volume":"7","author":"U. K.Sridevi","year":"2011","journal-title":"International Journal of Intelligent Information Technologies"},{"issue":"3","key":"jiit.2012070102-23","doi-asserted-by":"crossref","first-page":"14","DOI":"10.4018\/jiit.2011070102","article-title":"Intelligent information retrieval using fuzzy association rule classifier.","volume":"7","author":"S.Veeramalai","year":"2011","journal-title":"International Journal of Intelligent Information Technologies"},{"key":"jiit.2012070102-24","doi-asserted-by":"crossref","unstructured":"VidyaBanu. R., & Nagaveni, N. (2009). Preservation of data privacy using PCA based transformation. In Proceedings of the IEEE International Conference on Advances in Recent Technologies in Communication and Computing (pp. 439-443).","DOI":"10.1109\/ARTCom.2009.159"},{"key":"jiit.2012070102-25","article-title":"Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario.","journal-title":"Information Sciences"},{"issue":"3","key":"jiit.2012070102-26","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s10115-006-0035-5","article-title":"Handicapping attacker\u2019s confidence: An alternative to kanonymization.","volume":"11","author":"K.Wang","year":"2007","journal-title":"Knowledge and Information Systems: An International Journal"},{"key":"jiit.2012070102-27","unstructured":"Weisstein, E. W. (2011). K-means clustering algorithm. Retrieved April 28, 2011, from Math World -- A Wolfram Web Resource website: http:\/\/mathworld.wolfman.com"},{"issue":"1","key":"jiit.2012070102-28","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.clsr.2008.11.004","article-title":"Privacy, trust and policy-making: Challenges and responses.","volume":"25","author":"D.Wright","year":"2009","journal-title":"Computer Law & Security Report"},{"issue":"1","key":"jiit.2012070102-29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jiit.2011010101","article-title":"Classifying consumer comparison opinions to uncover product strengths and weaknesses.","volume":"7","author":"K. S. J.Xu","year":"2011","journal-title":"International Journal of Intelligent Information Technologies"},{"issue":"1","key":"jiit.2012070102-30","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1016\/j.eswa.2009.05.097","article-title":"A novel anonymization algorithm: Privacy protection and knowledge preservation.","volume":"37","author":"W.Yang","year":"2010","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"jiit.2012070102-31","doi-asserted-by":"crossref","first-page":"17","DOI":"10.4018\/jiit.2007040102","article-title":"Clustering Web pages into hierarchical categories.","volume":"3","author":"Z.Yao","year":"2007","journal-title":"International Journal of Intelligent Information Technologies"}],"container-title":["International Journal of Intelligent Information Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=69388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T21:36:00Z","timestamp":1654119360000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jiit.2012070102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,7,1]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jiit.2012070102","relation":{},"ISSN":["1548-3657","1548-3665"],"issn-type":[{"value":"1548-3657","type":"print"},{"value":"1548-3665","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,1]]}}}