An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining

被引:4
作者
Wang, Rong [1 ]
Zhu, Yan [1 ]
Chen, Tung-Shou [2 ]
Chang, Chin-Chen [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Sichuan, Peoples R China
[2] Natl Taichung Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taichung 404, Taiwan
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
关键词
privacy preserving data mining; data privacy; turtle shell algorithm; authentication;
D O I
10.1093/comjnl/bxy024
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing data mining tasks is beneficial for data owners who either lack expertise in data mining or sufficient computing resources. However, directly releasing the original data would leak private information. Research on Privacy-Preserving Data Mining (PPDM) is dedicated to addressing this issue, the aim of this research is to reduce the risk of privacy violations and preserve the knowledge in the original data. However, most existing methods in the literature ignore the case in which service providers want to verify the integrity and authenticity of their clients' data to avoid data tampering before performing data mining tasks. In this paper, a new method is proposed to extend the turtle shell algorithm of data hiding to protect the privacy of the original data and to acquire authentication functions simultaneously. The act of data perturbation is performed by replacing data values with their closest neighbors according to a reference matrix. Further, a message authentication code is hidden in the perturbed data to verify the integrity and authenticity of the perturbed data. The experimental results showed that the proposed method achieved the purpose of data perturbation and outperformed similar methods in satisfying the PPDM requirement.
引用
收藏
页码:1123 / 1132
页数:10
相关论文
共 23 条
[1]  
Aggarawal C. C, 2008, PRIVACY PRESERVING D
[2]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[3]   A Novel Turtle Shell Based Scheme for Data Hiding [J].
Chang, Ching-Chun ;
Liu, Yanjun ;
Thai-Son Nguyen .
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, :89-93
[4]   Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving [J].
Chen, Tung-Shou ;
Lee, Wei-Bin ;
Chen, Jeanne ;
Kao, Yuan-Hung ;
Hou, Pei-Wen .
JOURNAL OF SUPERCOMPUTING, 2013, 66 (02) :907-917
[5]   DATA-SWAPPING - A TECHNIQUE FOR DISCLOSURE CONTROL [J].
DALENIUS, T ;
REISS, SP .
JOURNAL OF STATISTICAL PLANNING AND INFERENCE, 1982, 6 (01) :73-85
[6]  
Deepakumara J, 2001, CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING 2001, VOLS I AND II, CONFERENCE PROCEEDINGS, P919, DOI 10.1109/CCECE.2001.933564
[7]  
Domingo-Ferrer J., 2001, PREPRO CEEDINGS ETK, V2, P807
[8]  
Domingo-Ferrer J., 2001, CHAPTER 6 CONFIDENTI, P111
[9]  
Han J, 2012, MOR KAUF D, P1
[10]   Using Anonymized Data for Classification [J].
Inan, Ali ;
Kantarcioglu, Murat ;
Bertino, Elisa .
ICDE: 2009 IEEE 25TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2009, :429-+