Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining

被引:0
|
作者
Yuan-Hung Kao
Wei-Bin Lee
Tien-Yu Hsu
Chen-Yi Lin
Hui-Fang Tsai
Tung-Shou Chen
机构
[1] Feng Chia University,Department of Information Engineering and Computer Science
[2] National Museum of Natural Science,Department of Operation, Visitor Service, Collection and Information Manage
[3] National Taichung University of Science and Technology,Department of Information Management
[4] Chung Shan Medical University,School of Medical Laboratory and Biotechnology
[5] National Taichung University of Science and Technology,Department of Computer Science and Information Engineering
关键词
Cloud computing; Big data; Reversible data hiding; Data perturbation;
D O I
暂无
中图分类号
学科分类号
摘要
Data mining has become an important service in cloud computing. Privacy-preserving schemes must be applied to the original data before data owners provide data publicly or send the data to remote servers for mining in order to avoid improper disclosure of privacy data. Previous studies have applied data perturbation approaches to modify the content of the original data; however, this might affect the accuracy of the mining results. To solve this issue, this study develops the reversible privacy contrast mapping (RPCM) algorithm, which applies the reversible data hiding techniques used in image processing to perturb and restore data. Furthermore, to identify whether perturbed data have been modified without authorization, RPCM allows users to embed watermarks in the data. The experimental results show that the knowledge contained in the data perturbed using RPCM is similar to that in the original data. The privacy disclosure risk does not increase when the degree of data perturbation increases.
引用
收藏
页码:789 / 794
页数:5
相关论文
共 50 条
  • [11] Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation
    Chen, Keke
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (12) : 1764 - 1776
  • [12] An efficient reversible privacy-preserving data mining technology over data streams
    Lin, Chen-Yi
    Kao, Yuan-Hung
    Lee, Wei-Bin
    Chen, Rong-Chang
    [J]. SPRINGERPLUS, 2016, 5
  • [13] Distributed Privacy-preserving Data Mining Method Research
    Chen, Qi
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 88 - 90
  • [14] Reversible Data Perturbation Techniques for Multi-level Privacy-Preserving Data Publication
    Li, Chao
    Palanisamy, Balaji
    Krishnamurthy, Prashant
    [J]. BIG DATA - BIGDATA 2018, 2018, 10968 : 26 - 42
  • [15] The density-based clustering method for privacy-preserving data mining
    Wu, Jimmy Ming-Tai
    Lin, Jerry Chun-Wei
    Fournier-Viger, Philippe
    Djenouri, Youcef
    Chen, Chun-Hao
    Li, Zhongcui
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (03) : 1718 - 1728
  • [16] A Review on Privacy-Preserving Data Mining
    Li, Xueyun
    Yan, Zheng
    Zhang, Peng
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 769 - 774
  • [17] Privacy-preserving collaborative data mining
    Zhan, J
    Chang, LW
    Matwin, S
    [J]. FOUNDATIONS AND NOVEL APPROACHES IN DATA MINING, 2006, 9 : 213 - +
  • [18] PRIVACY-PRESERVING COLLABORATIVE DATA MINING
    Zhan, Justin
    [J]. KMIS 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT AND INFORMATION SHARING, 2009, : IS15 - IS15
  • [19] Study of privacy-preserving data mining
    Dai, Guangming
    Zhou, Xingeng
    Wang, Maocai
    [J]. 2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 412 - 414
  • [20] Privacy-Preserving Outsourcing of Data Mining
    Monreale, Anna
    Wang, Wendy Hui
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 583 - 588