Secure support vector machines with Data Perturbation

被引:0
作者
Li, Xinning [1 ]
Zhou, Zhiping [1 ,2 ]
机构
[1] Jiangnan Univ, Sch Internet Things Engn, Wuxi 214122, Jiangsu, Peoples R China
[2] Jiangnan Univ, Minist Educ, Engn Res Ctr Internet Things Technol Applicat, Wuxi 214122, Jiangsu, Peoples R China
来源
PROCEEDINGS OF THE 30TH CHINESE CONTROL AND DECISION CONFERENCE (2018 CCDC) | 2018年
关键词
Privacy-preserving; Data Perturbation; Condensed Infommtion; Classification; Support Vector Machine;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In view of the increasing demand for privacy protection, traditional data mining process has to be optimized when the data owners are usually unwilling to release their original data for analysis. Aiming at the data classification in data mining, we have proposed CI-SVM (Condensed Information-Support Vector Machine) algorithm to achieve safe and efficient data classification. In this paper, the RCI-SVM (Random Linear Transformation with Condensed Information-Support Vector Machine) algorithm is proposed to use random linear transformation to convert the condensed infrirmation to another random vector space. The compressed information in CI-SVM are obtained by clustering the original data, although it is possible to ensure that the accurate original inforination will not be exposed, to some extent they may still carry some characteristics of the original datasets. Unlike most of the existing data perturbations, due to the early information enrichment processing, RCI-SVM will not preserve the dot product and Euclidean distance relationship between the original datasets and the transformed datasets, which means ifs stronger than existing methods in security. Our experiment results on datasets show that the proposed RCI-SVM algorithm can performs well on classification efficiency and security.
引用
收藏
页码:1170 / 1175
页数:6
相关论文
共 14 条
[1]   Saliency-SVM: An automatic approach for image segmentation [J].
Bai, Xuefei ;
Wang, Wenjian .
NEUROCOMPUTING, 2014, 136 :243-255
[2]  
Camara F, 2012, INT J COMPUTER SCI I, V9
[3]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[4]  
Chen KK, 2007, PROCEEDINGS OF THE SEVENTH SIAM INTERNATIONAL CONFERENCE ON DATA MINING, P78
[5]  
Hong M, 2013, J CHINESE AGR MECH, V5
[6]   Using Anonymized Data for Classification [J].
Inan, Ali ;
Kantarcioglu, Murat ;
Bertino, Elisa .
ICDE: 2009 IEEE 25TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2009, :429-+
[7]  
Khorshidtalab A., 2012, 2012 International Joint Conference on Computer Science and Software Engineering (JCSSE 2012), P17, DOI 10.1109/JCSSE.2012.6261918
[8]   Secure support vector machines outsourcing with random linear transformation [J].
Lin, Keng-Pei ;
Chang, Yi-Wei ;
Chen, Ming-Syan .
KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 44 (01) :147-176
[9]  
Mcauliffe R. E., 2015, Wiley Encyclopedia of Management.
[10]   Support vector machine with manifold regularization and partially labeling privacy protection [J].
Ni, Tongguang ;
Chung, Fu-Lai ;
Wang, Shitong .
INFORMATION SCIENCES, 2015, 294 :390-407