Privacy preserving method for knowledge discovered by data mining

被引:0
作者
Tedmori S. [1 ]
机构
[1] Department of Computer Science, King Hussein Faculty of Computing Sciences, Princess Sumaya University for Technology, P.O. Box 1438, Amman
关键词
Data engineering; Data mining; Discovering knowledge; Privacy preserving;
D O I
10.1504/IJICT.2019.096598
中图分类号
学科分类号
摘要
In spite of its success in a wide variety of applications, data mining technology raises a variety of ethical concerns which include among others privacy, intellectual property rights, and data security. In this paper, the author focuses on the privacy problem of unauthorised use of information obtained from knowledge discovered by secondary usage of data in clustering analysis. To address this problem, the author proposes the use of a combination of isometric data transformation methods as an approach to guarantee that data mining does not breach privacy. The three transformation methods of reflection, rotation, and translation are used to distort confidential numerical attributes for the purposes of satisfying the privacy requirements, while maintaining the general features of the cluster in clustering analysis. Experimental results show that the proposed algorithm is effective and provide acceptable values for balancing privacy and accuracy. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:31 / 45
页数:14
相关论文
共 40 条
[1]  
Adam N.R., Worthmann J.C., Security-control methods for statistical databases: A comparative study, ACM Computing Surveys (CSUR), 21, 4, pp. 515-556, (1989)
[2]  
Aggarwal C.C., Philip S.Y., A General Survey of Privacy-Preserving Data Mining Models and Algorithms, (2008)
[3]  
Agrawal D., Aggarwal C.C., On the design and quantification of privacy preserving data mining algorithms, Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 247-255, (2001)
[4]  
Agrawal R., Srikant R., Privacy-preserving data mining, ACM Sigmod Record, 29, 2, pp. 439-450, (2000)
[5]  
Alldrin N., Smith A., Turnbull D., Clustering with em and K-means, pp. 261-295, (2003)
[6]  
Bapna S., Gangopadhyay A., A wavelet-based approach to preserve privacy for classification mining, Decision Sciences, 37, 4, pp. 623-642, (2006)
[7]  
Brankovic L., Estivill-Castro V., Privacy issues in knowledge discovery and data mining, Australian Institute of Computer Ethics Conference, pp. 89-99, (1999)
[8]  
Castano S., Fugini M.G., Martella G., Samarati P., Database Security, 1, (1995)
[9]  
Catrina O., De Hoogh S., Secure multiparty linear programming using fixed-point arithmetic, Computer Security-ESORICS 2010, pp. 134-150, (2010)
[10]  
Chakrabarti S., Et al., Data Mining Curriculum: A Proposal (Version 1. 0), (2006)