Table of Contents
Advances in Computer Engineering
Volume 2014, Article ID 396529, 12 pages
http://dx.doi.org/10.1155/2014/396529
Research Article

A Clustering Approach for the -Diversity Model in Privacy Preserving Data Mining Using Fractional Calculus-Bacterial Foraging Optimization Algorithm

1Department of Information Technology, SNJB’s College of Engineering, Neminagar, Chandwad, Nashik, Maharashtra 423101, India
2Department of Computer Engineering, S V National Institute of Technology, Surat, Gujarat 395007, India

Received 14 July 2014; Accepted 22 July 2014; Published 16 September 2014

Academic Editor: Lijie Li

Copyright © 2014 Pawan R. Bhaladhare and Devesh C. Jinwala. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Lindell and B. Pinkas, “Privacy preserving data mining,” Journal of Cryptology, vol. 15, no. 3, pp. 177–206, 2002. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  2. M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, “Efficient privacy preserving K-means clustering,” in Intelligent and Security Informatics, vol. 6122 of Lecture Notes in Computer Science, pp. 154–166, 2010. View at Publisher · View at Google Scholar
  3. G. Jagannathan, K. Pillaipakkamnatt, R. N. Wright, and D. Umano, “Communication-efficient privacy preserving clustering,” Transactions on Data Privacy, vol. 3, no. 1, pp. 1–25, 2010. View at Google Scholar · View at MathSciNet · View at Scopus
  4. L. Sweeney, “k-anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  5. E. Kabir, H. Wang, E. Bertino, and Y. Chi, “Systematic clustering method for l-diversity model,” in Proceeding of 21st Australasian Conference on Database Technologies, vol. 104, pp. 93–102, Australian Computer Society, Darlinghurst, Australia, 2010.
  6. J. W. Byun, A. Kamra, E. Bertino, and N. Li, “Efficient k-anonymization using clustering techniques,” in Proceedings of the 12th International Conference on Database Systems for Advanced Applications, pp. 188–200, Springer, 2007.
  7. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, “Mondrian multidimensional K-anonymity,” in Proceedings of the 22nd International Conference on Data Engineering (ICDE '06), p. 25, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Loukides and J. Shao, “Capturing data usefulness and privacy protection in K-anonymisation,” in Proceedings of the ACM symposium on Applied computing (SAC '07), pp. 370–374, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. C.-C. Chiu and C.-Y. Tsai, “A k-anonymity clustering method for effective data privacy preservation,” in Proceeding of the 3rd International Conference on Advanced Data Mining and Application, vol. 4632, pp. 89–99, 2007.
  10. J.-L. Lin and M.-C. Wei, “An efficient clustering method for k-anonymization,” in Proceedings of the International Workshop on Privacy and Anonymity in Information Society (PAIS '08), pp. 46–50, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. M. E. Kabir, H. Wang, and E. Bertino, “Efficient systematic clustering method for k-anonymization,” Acta Informatica, vol. 48, no. 1, pp. 51–66, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. X. Xiao and Y. Tao, “Anatomy: simple and effective privacy preservation,” in Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 139–150, 2006.
  13. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, “L-diversity: privacy beyond k-anonymity,” in Proceedings of the 22nd International Conference on Data Engineering (ICDE '06), p. 24, Atlanta, Ga, USA, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  14. N. Li, T. Li, and S. Venkatasubramanian, “t-closeness: privacy beyond k-anonymity and l-diversity,” in Proceedings of the 23rd International Conference on Data Engineering, pp. 106–115, IEEE, Istanbul, Turkey, April 2007. View at Publisher · View at Google Scholar
  15. R. C.-W. Wong, J. Li, A. W.-C. Fu, and K. Wang, “(α, k) anonymity: an enhanced k-anonymity model for privacy preserving data publishing,” in Proceeding of the 12 th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 754–759, August 2006.
  16. J. Goldberger and T. Tassa, “Efficient anonymizations with enhanced utility,” Transactions on Data Privacy, vol. 3, no. 2, pp. 149–175, 2010. View at Google Scholar · View at MathSciNet · View at Scopus
  17. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, “Incognito: efficient full-domain k-anonymity,” in Proceeding of the ACM SIGMOD International Conference on Management of Data (SIGMOD '05), pp. 49–60, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  18. R. J. Bayardo and R. Agrawal, “Data privacy through optimal k-anonymization,” in Proceedings of the 21st International Conference on Data Engineering (ICDE '05), pp. 217–228, April 2005. View at Publisher · View at Google Scholar · View at Scopus
  19. M. Dorigo and L. M. Gambardella, “Ant colony system: a cooperative learning approach to the traveling salesman problem,” IEEE Transactions on Evolutionary Computation, vol. 1, no. 1, pp. 53–66, 1997. View at Publisher · View at Google Scholar · View at Scopus
  20. E. J. S. Pires, J. A. T. MacHado, P. B. de Moura Oliveira, J. B. Cunha, and L. Mendes, “Particle swarm optimization with fractional-order velocity,” Nonlinear Dynamics, vol. 61, no. 1-2, pp. 295–301, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. S. Das, A. Biswas, S. Dasgupta, and A. Abraham, “Bacterial foraging optimization algorithm: theoretical foundations, analysis and applications,” Foundation of Computational Intelligence, vol. 3, pp. 23–55, 2009. View at Google Scholar
  22. M. Wan, L. Li, J. Xiao, C. Wang, and Y. Yang, “Data clustering using bacterial foraging optimization,” Journal of Intelligent Information Systems, vol. 38, no. 2, pp. 321–341, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. M. S. Couceiro, R. P. Rocha, N. M. F. Ferreira, and J. A. T. Machado, “Introducing the fractional-order Darwinian PSO,” Signal, Image and Video Processing, vol. 6, no. 3, pp. 343–350, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. J. A. T. Machado, M. F. Silva, R. S. Barbosa et al., “Some applications of fractional calculus in engineering,” Mathematical Problems in Engineering, vol. 2010, Article ID 639801, 34 pages, 2010. View at Publisher · View at Google Scholar
  25. UCI machine learning repository, http://archive.ics.uci.edu/ml/datasets.html.
  26. J. MacQueen, “Some methods for classification and analysis of multivariate observations,” in Proceeding of the 5th Berkeley Symposium on Mathematical Statistics and Probability, pp. 281–297, University of California Press, 1967.
  27. D. Arthur and S. Vassilvitskii, “k-means++: the advantages of careful seeding,” in Proceeding of the 18 th annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1027–1035, Society for Industrial and Applied Mathematics, Philadelphia, PA, USA, 2007.