A Novel Approach for Pivacy preserving using Animal Migration Optimization and RSA algorithm

Authors

  • Bairagi N Department of CSE and IT, Madhav Institute of Technology and Science, Gwalior
  • Punit K Johari Department of CSE and IT, Madhav Institute of Technology and Science, Gwalior

Keywords:

Privacy Preservation, Data Modification, Privacy preserving techniques, Animal Migration Optimization and RSA Algorithm

Abstract

In recent years, the quantity of data between organizations, companies and governments has been produced and transmitted with extremely increased in number. Privateness preserving is without doubt one of the primary challenges in a computer world, when you consider that of the large amount of sensitive information on the internet. Additionally, with the quick increase of data mining technologies hidden relationships between items in databases can now be exposed with ease, for the reason of decision making or to determine user’s preferences. In the existing work, k-anonymity method used for the safety of sensitive data from the leakage or distribution to unauthorized users. However it is not sufficient for the protection of attribute disclosure. This method is also difficult to reverse the data to get the content. To overcome this problem, we performed the Animal Migration Optimization on the basis of age and then encryption is performed using RSA algorithm for achieving the security of the data and preserve from heavy data loss.

References

M. Patel, A. Hasan , S.Kumar, "A Survey: Preventing Discovering Association Rules for Large Data Base", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.2, pp.30-32, 2013.

Bullarao Domathoti, Rajia Begum and Nageswara Rao.P, "Privacy Preserving Collaborative Auditing Data Storage Scheme in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.212-218, 2015.

Md. Riyazuddin, Dr.V.V.S.S.S.Balaram, Md.Afroze, Md.JaffarSadiq, M.D.Zuber, “An Empirical Study on Privacy Preserving Data Mining”, ISSN: 2231-5381, Page 687, Volume3Issue6- 2012.

Y. Lindell and B. Pinkas, “Privacy preserving data mining”, J. Cryptology, 15(3):177–206, 2002.

R. Rajeswari and Mrs R. Kavitha ,”Privacy Preserving Mechanism for anonymizing data streams in data mining”, International conference on current research in Engineering Science and Technology(ICCREST-2016).

Tong Li, Zheli Liu, Zin Li, Chunfu Jia and Kuan-Ching Li, “A Cryptographic Data Publishing System”, J. Comput. Syst. Sci. (2016), http://dx.doi.org/10.1016/j.jcss.2016.12.004.

J. Jesu Vedha Nayahi and V. Kavitha,” Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop”, Future Generation Computer Systems, 0167-739X/© 2016 Elsevier.

Surbhi Sharma and Deepak Shukla, “Efficient multi-party privacy preserving data mining for vertically partitioned data”, Inventive Computation Technologies (ICICT), 10.1109/INVENTIVE.2016.7824852, © 2017 IEEE.

Prakash, M., and G. Singaravel. "An approach for prevention of privacy breach and information leakage in sensitive data mining." Computers & Electrical Engineering 45 (2015): 134-140.

V.K. Saxena, S. Pushkar, "Privacy Preserving using Encryption Proxy in Data Security", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.36-41, 2017.

L. Sweeney,“An Achieving k-Anonymity Privacy Protection using Generalization and Suppression”, International Journal of Uncertainty, Fuzziness and Knowledge-Based System, 2002, pp571-588.

Xiangtao Li, Jie Zhang and Minghao Yin, “Animal migration optimization: an optimization algorithm inspired by animal migration behavior,” Neural Comput & Applic (2014) 24:1867–1877.

https://archive.ics.uci.edu/ml/machine-learning-databases/adult/adult.data

Downloads

Published

2025-11-11

How to Cite

[1]
N. Bairagi and J. Punit K, “A Novel Approach for Pivacy preserving using Animal Migration Optimization and RSA algorithm”, Int. J. Comp. Sci. Eng., vol. 5, no. 6, pp. 193–197, Nov. 2025.

Issue

Section

Research Article