A new algorithm-independent method for privacy-preserving data mining

被引:0
|
作者
机构
[1] School of Electronic and Control Engineering, Chang'an University
[2] School of Computer Science and Technology, Harbin Institute of Technology
来源
Li, G. (hit6006@126.com) | 1600年 / Binary Information Press卷 / 10期
关键词
Data mining; Data perturbation; Privacy preserving;
D O I
10.12733/jcis9295
中图分类号
学科分类号
摘要
With the development of data mining technologies, privacy protection is becoming a challenge for data mining applications in many fields. To solve this problem, many PPDM (privacy-preserving data mining) methods have been proposed. One important type of PPDM method is based on data perturbation. Only part of the data-perturbation-based methods is algorithm-irrelevant, which are favorable because common data mining algorithms can be used directly. This paper proposes a new algorithm-irrelevant PPDM method based on data perturbation. Our method generates a new data set that is different from and has the same distribution as the original data set. Our experiments show that this new method can produce usable data while protecting privacy well. © 2014 Binary Information Press.
引用
收藏
页码:1473 / 1480
页数:7
相关论文
共 50 条
  • [21] Privacy-Preserving Data Mining for Smart Manufacturing
    Hu, Qianyu
    Chen, Ruimin
    Yang, Hui
    Kumara, Soundar
    SMART AND SUSTAINABLE MANUFACTURING SYSTEMS, 2020, 4 (02): : 99 - 120
  • [22] Hybrid Transformation in Privacy-Preserving Data Mining
    Putri, Awalia W.
    Hira, Laksmiwati
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2016,
  • [23] DATA MINING AS A TOOL IN PRIVACY-PRESERVING DATA PUBLISHING
    Sramka, Michal
    NILCRYPT 10, 2010, 45 : 151 - 159
  • [24] Privacy-preserving data mining: Developments and directions
    Thuraisingham, B
    JOURNAL OF DATABASE MANAGEMENT, 2005, 16 (01) : 75 - 87
  • [25] Analysis of Privacy-Preserving Mechanisms for Outsourcing Data Mining Tasks
    Chiew, Kevin
    Qin, Shaowen
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12542 - +
  • [26] A reversible data transform algorithm using integer transform for privacy-preserving data mining
    Lin, Chen-Yi
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 117 : 104 - 112
  • [27] A Privacy-Preserving Data Obfuscation Scheme Used in Data Statistics and Data Mining
    Yang, Pan
    Gui, Xiaolin
    Tian, Feng
    Yao, Jing
    Lin, Jiancai
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 881 - 887
  • [28] An accurate privacy-preserving data mining algorithm for frequent itemsets in distributed databases
    Hu Xiaodan
    Wang Yongchu
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1289 - 1291
  • [29] A tree-based data perturbation approach for privacy-preserving data mining
    Li, Xiao-Bai
    Sarkar, Sumit
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (09) : 1278 - 1283
  • [30] Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining
    Yuan-Hung Kao
    Wei-Bin Lee
    Tien-Yu Hsu
    Chen-Yi Lin
    Hui-Fang Tsai
    Tung-Shou Chen
    Journal of Medical and Biological Engineering, 2015, 35 : 789 - 794