Geometric data perturbation for privacy preserving outsourced data mining

被引:0
|
作者
Keke Chen
Ling Liu
机构
[1] Wright State University,Department of Computer Science and Engineering
[2] College of Computing,undefined
[3] Georgia Institute of Technology,undefined
来源
关键词
Privacy-preserving data mining; Data perturbation; Geometric data perturbation; Privacy evaluation; Data mining algorithms;
D O I
暂无
中图分类号
学科分类号
摘要
Data perturbation is a popular technique in privacy-preserving data mining. A major challenge in data perturbation is to balance privacy protection and data utility, which are normally considered as a pair of conflicting factors. We argue that selectively preserving the task/model specific information in perturbation will help achieve better privacy guarantee and better data utility. One type of such information is the multidimensional geometric information, which is implicitly utilized by many data-mining models. To preserve this information in data perturbation, we propose the Geometric Data Perturbation (GDP) method. In this paper, we describe several aspects of the GDP method. First, we show that several types of well-known data-mining models will deliver a comparable level of model quality over the geometrically perturbed data set as over the original data set. Second, we discuss the intuition behind the GDP method and compare it with other multidimensional perturbation methods such as random projection perturbation. Third, we propose a multi-column privacy evaluation framework for evaluating the effectiveness of geometric data perturbation with respect to different level of attacks. Finally, we use this evaluation framework to study a few attacks to geometrically perturbed data sets. Our experimental study also shows that geometric data perturbation can not only provide satisfactory privacy guarantee but also preserve modeling accuracy well.
引用
收藏
页码:657 / 695
页数:38
相关论文
共 50 条
  • [21] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311
  • [22] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [23] Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    Liu, K
    Kargupta, H
    Ryan, J
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (01) : 92 - 106
  • [24] Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining
    Kao, Yuan-Hung
    Lee, Wei-Bin
    Hsu, Tien-Yu
    Lin, Chen-Yi
    Tsai, Hui-Fang
    Chen, Tung-Shou
    [J]. JOURNAL OF MEDICAL AND BIOLOGICAL ENGINEERING, 2015, 35 (06) : 789 - 794
  • [25] SVD-based advanced data perturbation method for privacy-preserving data mining
    Li, Feng
    Li, Sheng-Hong
    Li, Jian-Hua
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2009, 43 (03): : 427 - 431
  • [26] Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining
    Yuan-Hung Kao
    Wei-Bin Lee
    Tien-Yu Hsu
    Chen-Yi Lin
    Hui-Fang Tsai
    Tung-Shou Chen
    [J]. Journal of Medical and Biological Engineering, 2015, 35 : 789 - 794
  • [27] A New Range Noise Perturbation Method based on Privacy Preserving Data Mining
    Shan, Jinzhao
    Lin, Ying
    Zhu, Xiaoke
    [J]. PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 131 - 136
  • [28] Privacy preserving data mining algorithms without the use of secure computation or perturbation
    Gurevich, Alex
    Gudes, Ehud
    [J]. 10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 121 - 128
  • [29] Evaluating Applicability Of Perturbation Techniques For Privacy Preserving Data Mining By Descriptive Statistics
    Shah, Alpa
    Gulati, Ravi
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 607 - 613
  • [30] A Chaos-based Multiplicative Perturbation Scheme for Privacy Preserving Data Mining
    Luo, Zhifeng
    Wen, Congmin
    [J]. 2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 941 - 944