A Chaos-based Multiplicative Perturbation Scheme for Privacy Preserving Data Mining

被引:0
|
作者
Luo, Zhifeng [1 ]
Wen, Congmin [1 ]
机构
[1] S China Univ Technol, Sch Elect & Informat Engn, Guangzhou 510641, Guangdong, Peoples R China
关键词
privacy preserving data mining; multiplicative perturbation; logistic map; K-ANONYMITY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The multiplicative perturbation is a popular scheme for privacy preserving data mining. It transforms the original data with the projection matrix. The security of projection matrix is a main concern in the multiplicative perturbation scheme. In this paper, we propose a novel multiplicative perturbation scheme which has a large key space. And we utilize the special property of chaotic systems, i.e., sensitivity to the initial condition and parameter, to design a new projection matrix generation algorithm. The experiment results show that the proposed scheme can preserve the privacy and maintain the utility for data miming.
引用
收藏
页码:941 / 944
页数:4
相关论文
共 50 条
  • [31] CRYPTANALYSIS OF A CHAOS-BASED ENCRYPTION SCHEME
    Ergun, Salih
    [J]. 2017 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2017), 2017, : 474 - 479
  • [32] A Privacy-Preserving Data Obfuscation Scheme Used in Data Statistics and Data Mining
    Yang, Pan
    Gui, Xiaolin
    Tian, Feng
    Yao, Jing
    Lin, Jiancai
    [J]. 2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 881 - 887
  • [33] Optimization for MASK scheme in privacy preserving data mining for association rules
    Andruszkiewicz, Piotr
    [J]. ROUGH SETS AND INTELLIGENT SYSTEMS PARADIGMS, PROCEEDINGS, 2007, 4585 : 465 - 474
  • [34] Privacy preserving data mining algorithms without the use of secure computation or perturbation
    Gurevich, Alex
    Gudes, Ehud
    [J]. 10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 121 - 128
  • [35] Evaluating Applicability Of Perturbation Techniques For Privacy Preserving Data Mining By Descriptive Statistics
    Shah, Alpa
    Gulati, Ravi
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 607 - 613
  • [36] A Hybrid Approach of Privacy Preserving Data Mining using Suppression and Perturbation Techniques
    Kaur, Arshveer
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 306 - 311
  • [37] A Classification Based Framework for Privacy Preserving Data Mining
    Tripathy, Animesh
    Dansana, Jayanti
    Mishra, Ranjita
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 660 - 666
  • [38] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [39] Lie hypergraph and chaos-based privacy preserving protocol for wireless sensor networks in IoT environment
    Sridharan, Supriya
    Rajendran, Sujarani
    Venkatraman, Swaminathan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023,
  • [40] DETECTIVE: A decision tree based categorical value clustering and perturbation technique for preserving privacy in data mining
    Islam, MZ
    Brankovic, L
    [J]. 2005 3rd IEEE International Conference on Industrial Informatics (INDIN), 2005, : 701 - 708