A Chaos-based Multiplicative Perturbation Scheme for Privacy Preserving Data Mining

被引:0
|
作者
Luo, Zhifeng [1 ]
Wen, Congmin [1 ]
机构
[1] S China Univ Technol, Sch Elect & Informat Engn, Guangzhou 510641, Guangdong, Peoples R China
关键词
privacy preserving data mining; multiplicative perturbation; logistic map; K-ANONYMITY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The multiplicative perturbation is a popular scheme for privacy preserving data mining. It transforms the original data with the projection matrix. The security of projection matrix is a main concern in the multiplicative perturbation scheme. In this paper, we propose a novel multiplicative perturbation scheme which has a large key space. And we utilize the special property of chaotic systems, i.e., sensitivity to the initial condition and parameter, to design a new projection matrix generation algorithm. The experiment results show that the proposed scheme can preserve the privacy and maintain the utility for data miming.
引用
收藏
页码:941 / 944
页数:4
相关论文
共 50 条
  • [1] Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    Liu, K
    Kargupta, H
    Ryan, J
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (01) : 92 - 106
  • [2] Privacy preserving sequential pattern mining based on data perturbation
    Ouyang, Wei-Min
    Xin, Hong-Liang
    Huang, Qin-Hua
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3239 - +
  • [3] Geometric data perturbation for privacy preserving outsourced data mining
    Chen, Keke
    Liu, Ling
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2011, 29 (03) : 657 - 695
  • [4] Geometric data perturbation for privacy preserving outsourced data mining
    Keke Chen
    Ling Liu
    [J]. Knowledge and Information Systems, 2011, 29 : 657 - 695
  • [5] Privacy Preserving Data Utility Mining Using Perturbation
    Jisna, Joseph
    Salim, A.
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 112 - 120
  • [6] A tree-based data perturbation approach for privacy-preserving data mining
    Li, Xiao-Bai
    Sarkar, Sumit
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (09) : 1278 - 1283
  • [7] A tree-based data perturbation approach for privacy-preserving data mining
    IEEE Computer Society
    不详
    不详
    [J]. IEEE Trans Knowl Data Eng, 2006, 9 (1278-1283):
  • [8] The applicability of the perturbation based privacy preserving data mining for real-world data
    Liu, Li
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    [J]. DATA & KNOWLEDGE ENGINEERING, 2008, 65 (01) : 5 - 21
  • [9] A New Range Noise Perturbation Method based on Privacy Preserving Data Mining
    Shan, Jinzhao
    Lin, Ying
    Zhu, Xiaoke
    [J]. PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 131 - 136
  • [10] Efficient data perturbation for privacy preserving and accurate data stream mining
    Chamikara, M. A. P.
    Bertok, P.
    Liu, D.
    Camtepe, S.
    Khalil, I
    [J]. PERVASIVE AND MOBILE COMPUTING, 2018, 48 : 1 - 19