Geometric data perturbation for privacy preserving outsourced data mining

被引:0
|
作者
Keke Chen
Ling Liu
机构
[1] Wright State University,Department of Computer Science and Engineering
[2] College of Computing,undefined
[3] Georgia Institute of Technology,undefined
来源
关键词
Privacy-preserving data mining; Data perturbation; Geometric data perturbation; Privacy evaluation; Data mining algorithms;
D O I
暂无
中图分类号
学科分类号
摘要
Data perturbation is a popular technique in privacy-preserving data mining. A major challenge in data perturbation is to balance privacy protection and data utility, which are normally considered as a pair of conflicting factors. We argue that selectively preserving the task/model specific information in perturbation will help achieve better privacy guarantee and better data utility. One type of such information is the multidimensional geometric information, which is implicitly utilized by many data-mining models. To preserve this information in data perturbation, we propose the Geometric Data Perturbation (GDP) method. In this paper, we describe several aspects of the GDP method. First, we show that several types of well-known data-mining models will deliver a comparable level of model quality over the geometrically perturbed data set as over the original data set. Second, we discuss the intuition behind the GDP method and compare it with other multidimensional perturbation methods such as random projection perturbation. Third, we propose a multi-column privacy evaluation framework for evaluating the effectiveness of geometric data perturbation with respect to different level of attacks. Finally, we use this evaluation framework to study a few attacks to geometrically perturbed data sets. Our experimental study also shows that geometric data perturbation can not only provide satisfactory privacy guarantee but also preserve modeling accuracy well.
引用
收藏
页码:657 / 695
页数:38
相关论文
共 50 条
  • [1] Geometric data perturbation for privacy preserving outsourced data mining
    Chen, Keke
    Liu, Ling
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2011, 29 (03) : 657 - 695
  • [2] Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation
    Chen, Keke
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (12) : 1764 - 1776
  • [3] ANALYSIS OF PRIVACY PRESERVING ECHANISMS FOR OUTSOURCED DATA MINING
    Agrawal, Khushbu
    Tewari, Vandan
    [J]. 2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 572 - 576
  • [4] Privacy Preserving Data Utility Mining Using Perturbation
    Jisna, Joseph
    Salim, A.
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 112 - 120
  • [5] Efficient data perturbation for privacy preserving and accurate data stream mining
    Chamikara, M. A. P.
    Bertok, P.
    Liu, D.
    Camtepe, S.
    Khalil, I
    [J]. PERVASIVE AND MOBILE COMPUTING, 2018, 48 : 1 - 19
  • [6] Random-data perturbation techniques and privacy-preserving data mining
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) : 387 - 414
  • [7] Distributed anonymous data perturbation method for privacy-preserving data mining
    Li, Feng
    Ma, Jin
    Li, Jian-hua
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2009, 10 (07): : 952 - 963
  • [8] Distributed anonymous data perturbation method for privacy-preserving data mining
    Feng Li
    Jin Ma
    Jian-hua Li
    [J]. Journal of Zhejiang University-SCIENCE A, 2009, 10 : 952 - 963
  • [10] Privacy preserving sequential pattern mining based on data perturbation
    Ouyang, Wei-Min
    Xin, Hong-Liang
    Huang, Qin-Hua
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3239 - +