Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining

被引:0
|
作者
Yuan-Hung Kao
Wei-Bin Lee
Tien-Yu Hsu
Chen-Yi Lin
Hui-Fang Tsai
Tung-Shou Chen
机构
[1] Feng Chia University,Department of Information Engineering and Computer Science
[2] National Museum of Natural Science,Department of Operation, Visitor Service, Collection and Information Manage
[3] National Taichung University of Science and Technology,Department of Information Management
[4] Chung Shan Medical University,School of Medical Laboratory and Biotechnology
[5] National Taichung University of Science and Technology,Department of Computer Science and Information Engineering
关键词
Cloud computing; Big data; Reversible data hiding; Data perturbation;
D O I
暂无
中图分类号
学科分类号
摘要
Data mining has become an important service in cloud computing. Privacy-preserving schemes must be applied to the original data before data owners provide data publicly or send the data to remote servers for mining in order to avoid improper disclosure of privacy data. Previous studies have applied data perturbation approaches to modify the content of the original data; however, this might affect the accuracy of the mining results. To solve this issue, this study develops the reversible privacy contrast mapping (RPCM) algorithm, which applies the reversible data hiding techniques used in image processing to perturb and restore data. Furthermore, to identify whether perturbed data have been modified without authorization, RPCM allows users to embed watermarks in the data. The experimental results show that the knowledge contained in the data perturbed using RPCM is similar to that in the original data. The privacy disclosure risk does not increase when the degree of data perturbation increases.
引用
收藏
页码:789 / 794
页数:5
相关论文
共 50 条
  • [1] Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining
    Kao, Yuan-Hung
    Lee, Wei-Bin
    Hsu, Tien-Yu
    Lin, Chen-Yi
    Tsai, Hui-Fang
    Chen, Tung-Shou
    [J]. JOURNAL OF MEDICAL AND BIOLOGICAL ENGINEERING, 2015, 35 (06) : 789 - 794
  • [2] Distributed anonymous data perturbation method for privacy-preserving data mining
    Feng Li
    Jin Ma
    Jian-hua Li
    [J]. Journal of Zhejiang University-SCIENCE A, 2009, 10 : 952 - 963
  • [3] Distributed anonymous data perturbation method for privacy-preserving data mining
    Li, Feng
    Ma, Jin
    Li, Jian-hua
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2009, 10 (07): : 952 - 963
  • [5] SVD-based advanced data perturbation method for privacy-preserving data mining
    Li, Feng
    Li, Sheng-Hong
    Li, Jian-Hua
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2009, 43 (03): : 427 - 431
  • [6] A tree-based data perturbation approach for privacy-preserving data mining
    Li, Xiao-Bai
    Sarkar, Sumit
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (09) : 1278 - 1283
  • [7] A tree-based data perturbation approach for privacy-preserving data mining
    IEEE Computer Society
    不详
    不详
    [J]. IEEE Trans Knowl Data Eng, 2006, 9 (1278-1283):
  • [8] Random-data perturbation techniques and privacy-preserving data mining
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) : 387 - 414
  • [9] Random-data perturbation techniques and privacy-preserving data mining
    Hillol Kargupta
    Souptik Datta
    Qi Wang
    Krishnamoorthy Sivakumar
    [J]. Knowledge and Information Systems, 2005, 7 : 387 - 414
  • [10] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450