Preserving Privacy in Time Series Data Mining

被引:3
|
作者
Zhu, Ye [1 ]
Fu, Yongjian [1 ]
Fu, Huirong [2 ]
机构
[1] Cleveland State Univ, Dept Elect & Comp Engn, Cleveland, OH 44115 USA
[2] Oakland Univ, Rochester, MI 48309 USA
基金
美国国家科学基金会;
关键词
Aggregation Error; Classification Accuracy; Privacy; Privacy Attacks; Time Series Data Mining;
D O I
10.4018/jdwm.2011100104
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Time series data mining poses new challenges to privacy. Through extensive experiments, the authors find that existing privacy-preserving techniques such as aggregation and adding random noise are insufficient due to privacy attacks such as data flow separation attack. This paper also presents a general model for publishing and mining time series data and its privacy issues. Based on the model, a spectrum of privacy preserving methods is proposed. For each method, effects on classification accuracy, aggregation error, and privacy leak are studied. Experiments are conducted to evaluate the performance of the methods. The results show that the methods can effectively preserve privacy without losing much classification accuracy and within a specified limit of aggregation error.
引用
收藏
页码:64 / 85
页数:22
相关论文
共 50 条
  • [1] On privacy in time series data mining
    Zhu, Ye
    Fu, Yongjian
    Fu, Huirong
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2008, 5012 : 479 - +
  • [2] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [3] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206
  • [4] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [5] Preserving Privacy in Time Series Data Classification by Discretization
    Zhu, Ye
    Fu, Yongjian
    Fu, Huirong
    [J]. MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, 2009, 5632 : 53 - +
  • [6] On privacy-preserving time series data classification
    Zhu, Ye
    Fu, Yongjian
    Fu, Huirong
    [J]. INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2010, 2 (02) : 117 - 136
  • [7] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [8] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [9] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [10] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +