Next Article in Journal
Least Squares Consensus for Matching Local Features
Next Article in Special Issue
An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Services
Previous Article in Journal
Terminology Translation in Low-Resource Scenarios
Previous Article in Special Issue
Personal Data Market Optimization Pricing Model Based on Privacy Level
Open AccessArticle

Encrypting and Preserving Sensitive Attributes in Customer Churn Data Using Novel Dragonfly Based Pseudonymizer Approach

Department of Computer Science and Engineering, RV College of Engineering, Bangalore 560059, India
*
Author to whom correspondence should be addressed.
Information 2019, 10(9), 274; https://doi.org/10.3390/info10090274
Received: 27 July 2019 / Revised: 21 August 2019 / Accepted: 28 August 2019 / Published: 31 August 2019
(This article belongs to the Special Issue The End of Privacy?)
With miscellaneous information accessible in public depositories, consumer data is the knowledgebase for anticipating client preferences. For instance, subscriber details are inspected in telecommunication sector to ascertain growth, customer engagement and imminent opportunity for advancement of services. Amongst such parameters, churn rate is substantial to scrutinize migrating consumers. However, predicting churn is often accustomed with prevalent risk of invading sensitive information from subscribers. Henceforth, it is worth safeguarding subtle details prior to customer-churn assessment. A dual approach is adopted based on dragonfly and pseudonymizer algorithms to secure lucidity of customer data. This twofold approach ensures sensitive attributes are protected prior to churn analysis. Exactitude of this method is investigated by comparing performances of conventional privacy preserving models against the current model. Furthermore, churn detection is substantiated prior and post data preservation for detecting information loss. It was found that the privacy based feature selection method secured sensitive attributes effectively as compared to traditional approaches. Moreover, information loss estimated prior and post security concealment identified random forest classifier as superlative churn detection model with enhanced accuracy of 94.3% and minimal data forfeiture of 0.32%. Likewise, this approach can be adopted in several domains to shield vulnerable information prior to data modeling. View Full-Text
Keywords: customer data; churn analysis; privacy; ensemble approach; data mining customer data; churn analysis; privacy; ensemble approach; data mining
Show Figures

Figure 1

MDPI and ACS Style

Nagaraj, K.; GS, S.; Sridhar, A. Encrypting and Preserving Sensitive Attributes in Customer Churn Data Using Novel Dragonfly Based Pseudonymizer Approach. Information 2019, 10, 274.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map

1
Back to TopTop