A survey: deriving private information from perturbed data

被引:22
作者
Okkalioglu, Burcu D. [1 ]
Okkalioglu, Murat [1 ]
Koc, Mehmet [2 ]
Polat, Huseyin [3 ]
机构
[1] Yalova Univ, Dept Comp Engn, TR-77100 Yalova, Turkey
[2] Bilecik Seyh Edebali Univ, Dept Elect & Elect Engn, TR-11210 Bilecik, Turkey
[3] Anadolu Univ, Dept Comp Engn, TR-26470 Eskisehir, Turkey
关键词
Data reconstruction; Data perturbation; Privacy; Attack resilience; Spectral filtering; RANDOMIZED-RESPONSE; RECONSTRUCTION; ERROR; NOISE;
D O I
10.1007/s10462-015-9439-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy-preserving data mining has attracted the attention of a large number of researchers. Many data perturbation methods have been proposed to ensure individual privacy. Such methods seem to be successful in providing privacy and accuracy. On one hand, different methods are utilized to preserve privacy. On the other hand, various data reconstruction approaches have been proposed to derive private information from perturbed data. Thus, many researchers have been conducting various studies about data reconstruction methods and the resilience of data perturbation schemes. In this survey, we focus on data reconstruction methods due to their importance in privacy-preserving data mining. We provide a detailed review of the data reconstruction methods and the data perturbation schemes attacked by different data reconstruction techniques. We merge our review with the evaluation metrics and the data sets used in current attack techniques. Finally, we pose some open questions to provide a better understanding of these approaches and to guide future study.
引用
收藏
页码:547 / 569
页数:23
相关论文
共 66 条
[1]  
Aggarwal CC, 2008, ADV DATABASE SYST, V34, P137
[2]  
Agrawal D., 2001, P 20 ACM SIGMOD SIGA, P247, DOI [DOI 10.1145/375551.375602, 10.1145/375551.375602]
[3]  
AGRAWAL R, 1992, PROC INT CONF VERY L, P560
[4]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[5]  
Agrawal S, 2005, PROC INT CONF DATA, P193
[6]  
Alaggan Mohammad, 2012, Stabilization, Safety, and Security of Distributed Systems. Proceedings of the 14th International Symposium, SSS 2012, P202, DOI 10.1007/978-3-642-33536-5_20
[7]   Dare to share: Protecting sensitive knowledge with data sanitization [J].
Amiri, Ali .
DECISION SUPPORT SYSTEMS, 2007, 43 (01) :181-191
[8]  
[Anonymous], 1990, Matrix perturbation theory
[9]  
[Anonymous], 2008, TECHNICAL REPORT
[10]  
[Anonymous], 2004, INTERSTAT