A tree-based data perturbation approach for privacy-preserving data mining

被引:0
|
作者
Li, Xiao-Bai [1 ]
Sarkar, Sumit
机构
[1] Univ Massachusetts, Coll Management, Lowell, MA 01854 USA
[2] Univ Texas Dallas, Sch Management, Richardson, TX 75080 USA
关键词
privacy; data mining; data perturbation; microaggregation; kd-trees;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to growing concerns about the privacy of personal information, organizations that use their customers' records in data mining activities are forced to take actions to protect the privacy of the individuals. A frequently used disclosure protection method is data perturbation. When used for data mining, it is desirable that perturbation preserves statistical relationships between attributes, while providing adequate protection for individual confidential data. To achieve this goal, we propose a kd-tree based perturbation method, which recursively partitions a data set into smaller subsets such that data records within each subset are more homogeneous after each partition. The confidential data in each final subset are then perturbed using the subset average. An experimental study is conducted to show the effectiveness of the proposed method.
引用
收藏
页码:1278 / 1283
页数:6
相关论文
共 50 条
  • [1] A tree-based data perturbation approach for privacy-preserving data mining
    IEEE Computer Society
    不详
    不详
    [J]. IEEE Trans Knowl Data Eng, 2006, 9 (1278-1283):
  • [2] Random-data perturbation techniques and privacy-preserving data mining
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) : 387 - 414
  • [3] Distributed anonymous data perturbation method for privacy-preserving data mining
    Li, Feng
    Ma, Jin
    Li, Jian-hua
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2009, 10 (07): : 952 - 963
  • [4] Distributed anonymous data perturbation method for privacy-preserving data mining
    Feng Li
    Jin Ma
    Jian-hua Li
    [J]. Journal of Zhejiang University-SCIENCE A, 2009, 10 : 952 - 963
  • [6] Random-data perturbation techniques and privacy-preserving data mining
    Hillol Kargupta
    Souptik Datta
    Qi Wang
    Krishnamoorthy Sivakumar
    [J]. Knowledge and Information Systems, 2005, 7 : 387 - 414
  • [7] Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining
    Kao, Yuan-Hung
    Lee, Wei-Bin
    Hsu, Tien-Yu
    Lin, Chen-Yi
    Tsai, Hui-Fang
    Chen, Tung-Shou
    [J]. JOURNAL OF MEDICAL AND BIOLOGICAL ENGINEERING, 2015, 35 (06) : 789 - 794
  • [8] SVD-based advanced data perturbation method for privacy-preserving data mining
    Li, Feng
    Li, Sheng-Hong
    Li, Jian-Hua
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2009, 43 (03): : 427 - 431
  • [9] Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining
    Yuan-Hung Kao
    Wei-Bin Lee
    Tien-Yu Hsu
    Chen-Yi Lin
    Hui-Fang Tsai
    Tung-Shou Chen
    [J]. Journal of Medical and Biological Engineering, 2015, 35 : 789 - 794
  • [10] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450