Random-data perturbation techniques and privacy-preserving data mining

被引:100
|
作者
Kargupta, H [1 ]
Datta, S
Wang, Q
Sivakumar, K
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
[2] Washington State Univ, Sch Elect Engn & Comp Sci, Pullman, WA 99164 USA
关键词
data mining; privacy; random perturbation; security;
D O I
10.1007/s10115-004-0173-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy is becoming an increasingly important issue in many data-mining applications. This has triggered the development of many privacy-preserving data-mining techniques. A large fraction of them use randomized data-distortion techniques to mask the data for preserving the privacy of sensitive data. This methodology attempts to hide the sensitive data by randomly modifying the data values often using additive noise. This paper questions the utility of the random-value distortion technique in privacy preservation. The paper first notes that random matrices have predictable structures in the spectral domain and then it develops a random matrix-based spectral-filtering technique to retrieve original data from the dataset distorted by adding random values. The proposed method works by comparing the spectrum generated from the observed data with that of random matrices. This paper presents the theoretical foundation and extensive experimental results to demonstrate that, in many cases, random-data distortion preserves very little data privacy. The analytical framework presented in this paper also points out several possible avenues for the development of new privacy-preserving data-mining techniques. Examples include algorithms that explicitly guard against privacy breaches through linear transformations, exploiting multiplicative and colored noise for preserving privacy in data mining applications.
引用
收藏
页码:387 / 414
页数:28
相关论文
共 50 条
  • [1] Random-data perturbation techniques and privacy-preserving data mining
    Hillol Kargupta
    Souptik Datta
    Qi Wang
    Krishnamoorthy Sivakumar
    [J]. Knowledge and Information Systems, 2005, 7 : 387 - 414
  • [2] Distributed anonymous data perturbation method for privacy-preserving data mining
    Feng Li
    Jin Ma
    Jian-hua Li
    [J]. Journal of Zhejiang University-SCIENCE A, 2009, 10 : 952 - 963
  • [3] Distributed anonymous data perturbation method for privacy-preserving data mining
    Li, Feng
    Ma, Jin
    Li, Jian-hua
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2009, 10 (07): : 952 - 963
  • [5] On the privacy preserving properties of random data perturbation techniques
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2003, : 99 - 106
  • [6] Comparative Analysis of Privacy-Preserving Data Mining Techniques
    Bhandari, Neetika
    Pahwa, Payal
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 535 - 541
  • [7] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [8] Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation
    Chen, Keke
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (12) : 1764 - 1776
  • [9] A tree-based data perturbation approach for privacy-preserving data mining
    Li, Xiao-Bai
    Sarkar, Sumit
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (09) : 1278 - 1283
  • [10] A tree-based data perturbation approach for privacy-preserving data mining
    IEEE Computer Society
    不详
    不详
    [J]. IEEE Trans Knowl Data Eng, 2006, 9 (1278-1283):