Vector Equivalent Replacing Based Privacy-Preserving Perturbing Method
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [12]
  • |
  • Related
  • |
  • Cited by [1]
  • | |
  • Comments
    Abstract:

    Privacy-Preserving data publishing has attracted considerable research interest over the past few years. The principle difference of clustering and obfuscating burdens the trade-off between clustering utility maintaining and privacy protection. Most of existing methods such as adopting strategies of distance-preservation, or distribution-preservation, cannot accommodate both clustering utility and privacy security of the data. As a trade-off, a neighborhood-preservation based perturbing algorithm VecREP (vector equivalent replacing based perturbing method) is proposed, which realizes good clustering utility by maintaining the nearest neighborhood for each data point. The definition of a safe neighborhood is introduced to stabilize the composition of the nearest neighborhood. The equivalent replacing arc is generated to realize distribution stability of nearest neighborhood leveraging vector offset and composition. For each data point, VecREP randomly chooses a point on its equivalent replacing arc inside corresponding safe neighborhood to make substitution. The algorithm is compared with existing methods such as RBT, TDR, Camp-crest and NeNDS. Experimental results demonstrate that VecREP competes in performance with RBT on maintaining clustering quality and, outperforms the other. It can avoid a reversible attack effectively and compared to the existing solution, ARMM has a shorter handover delay and a smaller location update and delivery cost.

    Reference
    [1] Kantarcioglu M, Jin JS, Clifton C. When do data mining results violate privacy? In: Kim W, Kohavi R, Gehrke J, DuMouchel W,eds. Proc. of the 10th ACM SIGKDD on Int'l Conf. Knowledge Discovery and Data Mining. New York: ACM Press, 2004.599-604. [doi: 10.1145/1014052.1014126]
    [2] Chen BC, Kifer D, LeFevre K, Machanavajjhala A. Privacy-Preserving data publishing. Foundations and Trends in Databases,2009,2(1-2):1-167. [doi: 10.1561/1900000008]
    [3] Zhou SG, Li F, Tao YF, Xiao XK. Privacy preservation in database applications: A survey. Chinese Journal of Computers, 2009,32(5):847-858 (in Chinese with English abstract). [doi: 10.3724/SP.J.1016.2009.00847]
    [4] Yang XC, Wang YZ, Wang B, Yu G. Privacy preserving approaches for multiple sensitive attributes in data publishing. ChineseJournal of Computers, 2008,31(4):574-587 (in Chinese with English abstract).
    [5] Oliveira SRM, Za?ane OR. Achieving privacy preservation when sharing data for clustering. In: Jonker W, Petkovic M, eds. Proc.of the Int'l Workshop on Secure Data Management in a Connected World. Berlin: Springer-Verlag, 2004. 67-82. [doi: 10.1007/978-3-540-30073-1_6]
    [6] Parameswaran R, Blough DM. Privacy preserving data obfuscation for inherently clustered data. Int'l Journal of Information andComputer Security, 2008,2(1):1744-1765. [doi: 10.1504/IJICS.2008.016819]
    [7] Mukherjee S, Chen ZY, Gangopadhyay A. A privacy-preserving technique for Euclidean distance-based mining algorithms usingFourier- related transforms. The Int'l Journal on Very Large Data Bases, 2006,15(4):293-315. [doi: 10.1007/s00778-006-0010-5]
    [8] Li XB, Sarkar S. Data clustering and micro-perturbation for privacy-preserving data sharing and analysis. In: Sabherwal R, SumnerM, eds. Proc. of the Int'l Conf. on Information Systems. Saint Louis: Association for Information Systems, 2010. 58-58. http://aisel.aisnet.org/icis2010_submissions/58
    [9] Fung BCM, Wang K, Wang LY, Hung PCK. Privacy-Preserving data publishing for cluster analysis. Data & KnowledgeEngineering, 2009,68(6):552-575. [doi: 10.1016/j.datak.2008.12.001]
    [10] Ni WW, Chen G, Chong ZH, Wu YJ. Privacy-Preserving data publishing for clustering. Journal of Computer Research andDevelopment, 2012,49(5):1095-1104 (in Chinese with English abstract).
    [11] Ester M, Kriegel HP, Sander J, Xu XW. A density based algorithm for discovering clusters in large spatial databases with noise. In:Simoudis E, Han JW, Fayyad UM, eds. Proc. of the 2nd Int'l Conf. on Knowledge Discovery and Data Mining (KDD'96). Menlo:AAAI Press, 1996. 226-231.
    [12] Ni WW, Chen G, Wu YJ, Sun ZH. Local density based distributed clustering algorithm. Journal of Software, 2008,19(9):2339-2348 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/19/2339.htm [doi: 10.3724/SP.J.1001.2008.02339]
    Related
    Comments
    Comments
    分享到微博
    Submit
Get Citation

倪巍伟,张勇,黄茂峰,崇志宏,贺玉芝.一种向量等价置换隐私保护数据干扰方法.软件学报,2012,23(12):3198-3208

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:July 25,2010
  • Revised:July 23,2012
  • Online: December 05,2012
You are the first2038072Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063