Privacy preserving burst detection of distributed time series data using linear transforms

被引:5
|
作者
Singh, Lisa [1 ]
Sayal, Mehmet [2 ]
机构
[1] Georgetown Univ, Dept Comp Sci, Washington, DC 20057 USA
[2] Hewlett Packard Labs, Palo Alto, CA 94304 USA
来源
2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2 | 2007年
关键词
D O I
10.1109/CIDM.2007.368937
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of the parties want to disclose their individual data. Our approach calculates bursts directly from linear transform coefficients using a cumulative sum calculation. In order to reduce the chance of a privacy breech, we present multiple data perturbation strategies and compare the varying degrees of privacy preserved. Our strategies do not share raw time series data and still detect significant bursts. We empirically demonstrate this using both real and synthetic distributed data sets. When evaluating both privacy guarantees and burst detection accuracy, we find that our percentage thresholding heuristic maintains a high degree of privacy while accurately identifying bursts of varying widths.
引用
收藏
页码:646 / 653
页数:8
相关论文
共 50 条
  • [21] A fast privacy-preserving patient record linkage of time series data
    Soliman, Ahmed
    Rajasekaran, Sanguthevar
    Toman, Patrick
    Ravishanker, Nalini
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [22] A fast privacy-preserving patient record linkage of time series data
    Ahmed Soliman
    Sanguthevar Rajasekaran
    Patrick Toman
    Nalini Ravishanker
    Scientific Reports, 13
  • [23] A New Framework for Privacy-Preserving Aggregation of Time-Series Data
    Benhamouda, Fabrice
    Joye, Marc
    Libert, Benoit
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2016, 18 (03)
  • [24] Preserving Privacy in Vertically Partitioned Distributed Data Using Hierarchical and Ring Models
    Srinivas, R.
    Sireesha, K. A.
    Vahida, Shaik
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2016, 2017, 517 : 585 - 596
  • [25] An system of privacy preserving distributed spatial data warehouse using relation decomposition
    Gorawski, Marcin
    Panfil, Szymon
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 522 - 527
  • [26] A Privacy-Preserving Approach to Effectively Utilize Distributed Data for Malaria Image Detection
    Kareem, Amer
    Liu, Haiming
    Velisavljevic, Vladan
    BIOENGINEERING-BASEL, 2024, 11 (04):
  • [27] Privacy Preserving Distributed Data Mining with Evolutionary Computing
    Jena, Lambodar
    Kamila, Narendra Ku.
    Mishra, Sushruta
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2013, 2014, 247 : 259 - 267
  • [28] Research on distributed privacy-preserving data mining
    Jia, Zhe
    Pang, Lei
    Luo, Shoushan
    Xin, Yang
    Zhang, Miao
    Journal of Convergence Information Technology, 2012, 7 (01) : 356 - 367
  • [29] Privacy-preserving ridge regression on distributed data
    Chen, Yi-Ruei
    Rezapour, Amir
    Tzeng, Wen-Guey
    INFORMATION SCIENCES, 2018, 451 : 34 - 49
  • [30] Research on the Personalized Privacy Preserving Distributed Data Mining
    Shen, Yanguang
    Shao, Hui
    Li, Yan
    2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009, 2009, : 436 - 439