Evaluating Applicability Of Perturbation Techniques For Privacy Preserving Data Mining By Descriptive Statistics

被引:0
|
作者
Shah, Alpa [1 ]
Gulati, Ravi [2 ]
机构
[1] Sarvajanik Coll Engn & Technol, Comp Applicat, Surat, India
[2] Veer Narmad South Gujarat Univ, Dept Comp Sci, Surat, India
关键词
Privacy Preserving Data Mining; Additive White Gaussian Noise; Multiplicative Perturbation; Geometric Data Perturbation; Euclidean Distance;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Extensive research has been carried out for preserving the privacy of identifiers in dataset during Data Mining. Various dimensions based on Cryptographic principles, Perturbation and Secure Sum Computation have been studied to achieve privacy. Effective techniques to maximize privacy and minimize information loss have always been intriguing. The work in this paper presents a comparison based on experimental study of three fundamental perturbation techniques viz. - Additive, Multiplicative and Geometric Data Perturbation [GDP] for Privacy Preserving Data Mining [PPDM]. These techniques form the basis of many advanced Perturbation techniques as described later. The literature doesn't embark a clear cut comparison amongst the three techniques based on suitable metrics. We have identified various statistical metrics that must be considered for evaluating Perturbation techniques. The facet of research is independent in this context, and this paper will try to confer the applicability of perturbation techniques by descriptive statistics through experiments under one root A comparison amongst the perturbation based techniques is conferred at the end to exemplify the importance of this research.
引用
收藏
页码:607 / 613
页数:7
相关论文
共 50 条
  • [1] The applicability of the perturbation based privacy preserving data mining for real-world data
    Liu, Li
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    [J]. DATA & KNOWLEDGE ENGINEERING, 2008, 65 (01) : 5 - 21
  • [2] Random-data perturbation techniques and privacy-preserving data mining
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) : 387 - 414
  • [3] Random-data perturbation techniques and privacy-preserving data mining
    Hillol Kargupta
    Souptik Datta
    Qi Wang
    Krishnamoorthy Sivakumar
    [J]. Knowledge and Information Systems, 2005, 7 : 387 - 414
  • [4] A Hybrid Approach of Privacy Preserving Data Mining using Suppression and Perturbation Techniques
    Kaur, Arshveer
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 306 - 311
  • [5] The applicability of the perturbation model-based privacy preserving data mining for real-world data
    Liu, Li
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    [J]. ICDM 2006: SIXTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, WORKSHOPS, 2006, : 507 - +
  • [6] Geometric data perturbation for privacy preserving outsourced data mining
    Chen, Keke
    Liu, Ling
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2011, 29 (03) : 657 - 695
  • [7] Geometric data perturbation for privacy preserving outsourced data mining
    Keke Chen
    Ling Liu
    [J]. Knowledge and Information Systems, 2011, 29 : 657 - 695
  • [8] Privacy Preserving Data Utility Mining Using Perturbation
    Jisna, Joseph
    Salim, A.
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 112 - 120
  • [9] On the privacy preserving properties of random data perturbation techniques
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2003, : 99 - 106
  • [10] A Framework for Evaluating Privacy Preserving Data Mining Algorithms*
    Elisa Bertino
    Igor Nai Fovino
    Loredana Parasiliti Provenza
    [J]. Data Mining and Knowledge Discovery, 2005, 11 : 121 - 154