Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining

被引:0
|
作者
Yuan-Hung Kao
Wei-Bin Lee
Tien-Yu Hsu
Chen-Yi Lin
Hui-Fang Tsai
Tung-Shou Chen
机构
[1] Feng Chia University,Department of Information Engineering and Computer Science
[2] National Museum of Natural Science,Department of Operation, Visitor Service, Collection and Information Manage
[3] National Taichung University of Science and Technology,Department of Information Management
[4] Chung Shan Medical University,School of Medical Laboratory and Biotechnology
[5] National Taichung University of Science and Technology,Department of Computer Science and Information Engineering
关键词
Cloud computing; Big data; Reversible data hiding; Data perturbation;
D O I
暂无
中图分类号
学科分类号
摘要
Data mining has become an important service in cloud computing. Privacy-preserving schemes must be applied to the original data before data owners provide data publicly or send the data to remote servers for mining in order to avoid improper disclosure of privacy data. Previous studies have applied data perturbation approaches to modify the content of the original data; however, this might affect the accuracy of the mining results. To solve this issue, this study develops the reversible privacy contrast mapping (RPCM) algorithm, which applies the reversible data hiding techniques used in image processing to perturb and restore data. Furthermore, to identify whether perturbed data have been modified without authorization, RPCM allows users to embed watermarks in the data. The experimental results show that the knowledge contained in the data perturbed using RPCM is similar to that in the original data. The privacy disclosure risk does not increase when the degree of data perturbation increases.
引用
收藏
页码:789 / 794
页数:5
相关论文
共 50 条
  • [31] An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining
    Wang, Rong
    Zhu, Yan
    Chen, Tung-Shou
    Chang, Chin-Chen
    [J]. COMPUTER JOURNAL, 2018, 61 (08): : 1123 - 1132
  • [32] Privacy preserving sequential pattern mining based on data perturbation
    Ouyang, Wei-Min
    Xin, Hong-Liang
    Huang, Qin-Hua
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3239 - +
  • [33] A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing
    Yang Pan
    Gui Xiaolin
    An Jian
    Yao Jing
    Lin Jiancai
    Tian Feng
    [J]. CHINA COMMUNICATIONS, 2014, 11 (08) : 73 - 84
  • [34] Privacy-preserving data mining in the malicious model
    Kantarcioglu, Murat
    Kardes, Onur
    [J]. International Journal of Information and Computer Security, 2008, 2 (04) : 353 - 375
  • [35] Research on distributed privacy-preserving data mining
    Jia, Zhe
    Pang, Lei
    Luo, Shoushan
    Xin, Yang
    Zhang, Miao
    [J]. Journal of Convergence Information Technology, 2012, 7 (01) : 356 - 367
  • [36] Research on Privacy-Preserving Technology of Data Mining
    Shen, Yanguang
    Han, Junrui
    HuiShao
    [J]. ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 612 - 614
  • [37] An improved algorithm for privacy-preserving data mining based on NMF
    Li, Guang
    Xi, Meng
    [J]. Journal of Information and Computational Science, 2015, 12 (09): : 3423 - 3430
  • [38] Privacy-preserving data mining in electronic surveys
    Zhan, Justin
    Matwin, Stan
    [J]. International Journal of Network Security, 2007, 4 (03) : 318 - 327
  • [39] Privacy-Preserving Data Mining for Smart Manufacturing
    Hu, Qianyu
    Chen, Ruimin
    Yang, Hui
    Kumara, Soundar
    [J]. SMART AND SUSTAINABLE MANUFACTURING SYSTEMS, 2020, 4 (02): : 99 - 120
  • [40] Privacy-preserving data mining in electronic surveys
    Zhan, J
    Matwin, S
    [J]. SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1179 - 1185