In case of positive results of the simulations, a further
comprehensive case study will implement the model.
Recommender systems that currently are a topic of
discussion in e-business applications from both sides,
privacy and utility, seem to be the most suitable case
study for evaluating the defined model.
All in all, the expected results of applying this
model, including various methods, would be sensitive
data better protected against privacy attacks in
different parts of SOM clustering when run in a
distributed environment. It should be noted that this
improvement of privacy protection would not
sacrifice the efficiency of regular SOM clustering.
Also, the amount of information loss would not be
considerable. In other words, the result of SOM
clustering before and after applying the proposed
methods in SPE model should be relatively similar in
terms of performance and accuracy.
6 CONCLUSION
The idea presented in this paper focuses on the issue
of privacy of individuals in e-business applications,
which involves big data and therefore data mining
techniques. Data mining on big data in combination
with privacy-preservation is still an open problem.
Among lots of methods proposed to improve privacy,
the lack of a strong method that could protect privacy
and also keeps efficiency and accuracy of the data
mining tasks at hand, still exists. Therefore, newer
methodologies like soft computing, also known as
machine learning, seem to be more useful for closing
these gaps. The proposed model in this paper
contributes to solving the defined problem in e-
business environments. The SPE model is flexible
and helps system administrators to keep a balance
between performance and privacy protection. Two
privacy-preserving methods have been introduced for
the SPE model which are independent and arbitrary
to implement. First results prove the usefulness of the
model and the methods, respectively. However more
simulations with huge datasets are still required to
check the utility of the SPE model in general. The
result of the proposed model in this paper is sensitive
data being protected against privacy attacks in SOM
clustering without significantly jeopardizing the
efficiency and accuracy of the general process.
ACKNOWLEDGEMENTS
This paper is partially funded by SBA Research,
Vienna, Austria.
REFERENCES
Aggarwal, C. C. & Philip, S. Y. 2008. A general survey of
privacy-preserving data mining models and algorithms.
Privacy-preserving data mining. Springer.
Agrawal, R. & Srikant, R. Privacy-preserving data mining.
ACM Sigmod Record, 2000. ACM, 439-450.
Amiri, F. & Quirchmayr, G. 2017. A comparative study on
innovative approaches for privacy-preserving in
knowledge discovery. ICIME ,ACM.
Blocki, J. & Williams, R. Resolving The Complexity of
some data privacy problems. International Colloquium
on Automata, Languages, and Programming, 2010.
Springer, 393-404.
Bonizzoni, P., Della Vedova, G. & Dondi, R. The k-
anonymity problem is hard. International Symposium
on Fundamentals of Computation Theory, 2009.
Springer, 26-37.
Chen, H. 2006. Intelligence and security informatics:
information systems perspective. Decision Support
Systems, 41, 555-559.
Fayyad, U. M., Piatetsky-Shapiro, G., Smyth, P. &
Uthurusamy, R. 1996. Advances in knowledge
discovery and data mining, AAAI press Menlo Park.
Gorgonio, F. L. & Costa, J. A. F. Combining parallel self-
organizing maps and k-means to cluster distributed
data. Computational Science and Engineering
Workshops, 2008. CSEWORKSHOPS'08. 11th IEEE
International Conference on, 2008. IEEE, 53-58.
Han, S. & Ng, W. K. Privacy-preserving self-organizing
map. DaWaK, 2007. Springer, 428-437.
Jahan, T., Narasimha, G. & Rao, C. G. 2014. A
Comparative Study of Data Perturbation Using Fuzzy
Logic to Preserve Privacy. Networks and Communica-
tions (NetCom2013). Springer.
Kohonen, T. 1982. Self-organized formation of
topologically correct feature maps. Biological
cybernetics, 43, 59-69.
Kohonen, T. & Maps, S.-O. 1995. Springer series in
information sciences. Self-organizing maps, 30.
Li, P., Chen, Z., Yang, L. T., Zhao, L. & Zhang, Q. 2017.
A privacy-preserving high-order neuro-fuzzy c-means
algorithm with cloud computing. Neurocomputing,
256, 82-89.
Maimon, O. & Rokach, L. 2007. Soft Computing for
knowledge discovery and data mining, Springer
Science & Business Media.
Malik, M. B., Ghazi, M. A. & Ali, R. Privacy preserving
data mining techniques: current scenario and future
prospects. Computer and Communication Technology
(ICCCT), 2012 Third International Conference on,
2012. IEEE, 26-32.
Mingoti, S. A. & Lima, J. O. 2006. Comparing SOM neural
network with Fuzzy c-means, K-means and traditional
hierarchical clustering algorithms. European Journal of
Operational Research, 174, 1742-1759.
Mitra, S., Pal, S. K. & Mitra, P. 2002. Data Mining in soft
computing framework: a survey. IEEE transactions on
neural networks, 13, 3-14.
A Machine Learning Approach for Privacy-preservation in E-business Applications
451