期刊论文详细信息
ETRI Journal
Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering
关键词: rotation-based transformation;    measurements;    data clustering;    Privacy preservation;   
Others  :  1185932
DOI  :  10.4218/etrij.10.0109.0333
PDF
【 摘 要 】

Multiple rotation-based transformation (MRBT) was introduced recently for mitigating the apriori-knowledge independent component analysis (AK-ICA) attack on rotation-based transformation (RBT), which is used for privacy-preserving data clustering. MRBT is shown to mitigate the AK-ICA attack but at the expense of data utility by not enabling conventional clustering. In this paper, we extend the MRBT scheme and introduce an augmented rotation-based transformation (ARBT) scheme that utilizes linearity of transformation and that both mitigates the AK-ICA attack and enables conventional clustering on data subsets transformed using the MRBT. In order to demonstrate the computational feasibility aspect of ARBT along with RBT and MRBT, we develop a toolkit and use it to empirically compare the different schemes of privacy-preserving data clustering based on data transformation in terms of their overhead and privacy.

【 授权许可】

   

【 预 览 】
附件列表
Files Size Format View
20150520115846867.pdf 841KB PDF download
【 参考文献 】
  • [1]M. F. Mokbel, "Privacy in Location-Based Services: State-of-the-Art and Research Directions," Proc. MDM, 2007, pp. 228-229.
  • [2]M. Goebel and L. Gruenwald, "A Survey of Data Mining and Knowledge Discovery Software Tools," SIGKDD Explorations, vol. 1, no. 1, 1999, pp. 20-33.
  • [3]R. Agrawal and R. Srikant, "Privacy Preserving Data Mining," Proc. ACM SIGMOD, 2000, pp. 439-450.
  • [4]A. Mohaisen and D. Hong, "Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering," ETRI J., vol. 30, no. 6, 2008, pp. 868-870.
  • [5]S.R.M. Oliveira and O.R. Zaïane, "Achieving Privacy Preservation When Sharing Data for Clustering," Proc. SDM, 2004, pp. 67-82.
  • [6]K. Liu, H. Kargupta, and J. Ryan, "Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, 2006, pp. 92-106.
  • [7]E. Bertino, I. Fovino, and L.P. Provenza, "A Framework for Evaluating Privacy Preserving Data Mining Algorithms," Data Min. Knowl. Discov., vol. 11, no. 2, 2005, pp. 121-154.
  • [8]K. Chen and L. Liu, "Privacy Preserving Data Classification with Rotation Perturbation," Proc. ICDM, 2005, pp. 589-592.
  • [9]S. Guo and X. Wu, "Deriving Private Information from Arbitrarily Projected Data," Proc. PAKDD, 2007, pp. 84-95.
  • [10]N. Zhang, W. Zhao, and J. Chen, "Performance Measurements for Privacy Preserving Data Mining," Proc. PAKDD, 2005, pp. 43-49.
  • [11]N Zhang, S. Wang, and W. Zhao, "A New Scheme on Privacy-Preserving Data Classification," Proc. KDD, 2005, pp. 374-383.
  • [12]H. Kargupta, K. Das, and K. Liu, "Multi-Party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework," Proc. PKDD, 2007, pp. 523-531.
  • [13]H. Garcia-Molina, J.D. Ullman, and J. Widom, Database Systems: The Complete Book, Prentice Hall, 2001, pp. 61-65.
  • [14]S.K. Gupta, K.S. Rao, and V. Bhatnagar, "K-Means Clustering for Categorical Attributes," Proc. DaWaK, 1999, pp. 203-208.
  • [15]L. Xiong, S. Chitti, and L. Liu, "Mining Multiple Private Databases Using a kNN Classifier," Proc. SAC, 2007, pp. 435-440.
  • [16]A. Evfimievski et al., "Privacy Preserving Mining of Association Rules," Proc. KDD, 2002, pp. 217-228.
  • [17]J.L. Lin and J.Y.C. Liu, "Privacy Preserving Itemset Mining through Fake Transactions," Proc. SAC, 2007, pp. 375-379.
  • [18]H. Jin et al., "Privacy-Preserving Sequential Pattern Release," Proc. PAKDD, 2007, pp. 547-554.
  • [19]M. Atzori et al., "Towards Low-Perturbation Anonymity Preserving Pattern Discovery," Proc. SAC, 2006, pp. 588-592.
  • [20]K. Liu, H. Kargupta, and J. Ryan, "Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, 2006, pp. 929-106.
  • [21]A. Hyvarinen, J. Karhunen, and E. Oja, "Independent Component Analysis," Proc. Conf. Uncertainty in Artificial Intelligence, 2000, pp. 21-30.
  文献评价指标  
  下载次数:9次 浏览次数:21次