A new algorithm-independent method for privacy-preserving classification based on sample generation

被引:0
作者
School of Electronic and Control Engineering, Chang’an University, Xi’an [1 ]
Shaanxi
710064, China
机构
[1] School of Electronic and Control Engineering, Chang’an University, Xi’an, 710064, Shaanxi
来源
Open. Cybern. Syst. J. | / 1卷 / 443-447期
基金
中国国家自然科学基金;
关键词
Data mining; Data perturbation; Privacy preserving;
D O I
10.2174/1874110X01509010443
中图分类号
学科分类号
摘要
With the development of data mining technologies, privacy protection is becoming a challenge for data mining applications in many fields. To solve this problem, many PPDM (privacy-preserving data mining) methods have been proposed. One important type of PPDM method is based on data perturbation. Only part of the data-perturbation-based methods is algorithm-irrelevant, which are favorable because common data mining algorithms can be used directly. This paper proposes a new algorithm-irrelevant PPDM method for classification based on sample generation. This method is a data-perturbation-based method and has three steps. First, it trains classifiers use the original data. Then, it generates new samples as the perturbed data randomly. Finally, it use the classifiers trained in the first step to predict these samples’ category. The experiments show that this new method can produce usable data while protecting privacy well. © Li and Xi.
引用
收藏
页码:443 / 447
页数:4
相关论文
共 50 条
  • [31] Privacy-preserving outsourced classification in cloud computing
    Ping Li
    Jin Li
    Zhengan Huang
    Chong-Zhi Gao
    Wen-Bin Chen
    Kai Chen
    Cluster Computing, 2018, 21 : 277 - 286
  • [32] Privacy-preserving outsourced classification in cloud computing
    Li, Ping
    Li, Jin
    Huang, Zhengan
    Gao, Chong-Zhi
    Chen, Wen-Bin
    Chen, Kai
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 277 - 286
  • [33] EFFICIENT PRIVACY-PRESERVING CLASSIFICATION OF ECG SIGNALS
    Barni, Mauro
    Failla, Pierluigi
    Lazzereni, Riccardo
    Paus, Annika
    Sadeghi, Ahmad-Reza
    Schneider, Thomas
    Kolesnikov, Vladimir
    2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 91 - +
  • [34] A Simple and Direct Privacy-Preserving Classification Scheme
    Jiang, Rongrong
    Chen, Tieming
    KNOWLEDGE ENGINEERING AND MANAGEMENT, 2011, 123 : 455 - +
  • [35] Incentive Compatible Privacy-Preserving Distributed Classification
    Nix, Robert
    Kantarcioglu, Murat
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (04) : 451 - 462
  • [36] A Review of Privacy-Preserving Machine Learning Classification
    Wang, Andy
    Wang, Chen
    Bi, Meng
    Xu, Jian
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 671 - 682
  • [37] Design of a privacy-preserving algorithm for peer-to-peer network based on differential privacy
    Yu J.
    Ingenierie des Systemes d'Information, 2019, 24 (04): : 433 - 437
  • [38] Privacy-Preserving Recommendation Based on Kernel Method in Cloud Computing
    Li, Tao
    Qian, Qi
    Ren, Yongjun
    Ren, Yongzhen
    Xia, Jinyue
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01): : 779 - 791
  • [39] A Privacy-Preserving Method Based on Artificial Immune Computing in MCS
    Long, Hao
    Hao, Jiawei
    Zhang, Shukui
    Zhang, Yang
    Zhang, Li
    IEEE ACCESS, 2023, 11 : 134074 - 134086
  • [40] Efficient privacy-preserving decision tree classification protocol
    Ma L.
    Peng J.
    Pei Q.
    Zhu H.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 80 - 89