An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining

被引:4
|
作者
Wang, Rong [1 ]
Zhu, Yan [1 ]
Chen, Tung-Shou [2 ]
Chang, Chin-Chen [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Sichuan, Peoples R China
[2] Natl Taichung Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taichung 404, Taiwan
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
来源
COMPUTER JOURNAL | 2018年 / 61卷 / 08期
关键词
privacy preserving data mining; data privacy; turtle shell algorithm; authentication;
D O I
10.1093/comjnl/bxy024
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing data mining tasks is beneficial for data owners who either lack expertise in data mining or sufficient computing resources. However, directly releasing the original data would leak private information. Research on Privacy-Preserving Data Mining (PPDM) is dedicated to addressing this issue, the aim of this research is to reduce the risk of privacy violations and preserve the knowledge in the original data. However, most existing methods in the literature ignore the case in which service providers want to verify the integrity and authenticity of their clients' data to avoid data tampering before performing data mining tasks. In this paper, a new method is proposed to extend the turtle shell algorithm of data hiding to protect the privacy of the original data and to acquire authentication functions simultaneously. The act of data perturbation is performed by replacing data values with their closest neighbors according to a reference matrix. Further, a message authentication code is hidden in the perturbed data to verify the integrity and authenticity of the perturbed data. The experimental results showed that the proposed method achieved the purpose of data perturbation and outperformed similar methods in satisfying the PPDM requirement.
引用
收藏
页码:1123 / 1132
页数:10
相关论文
共 50 条
  • [1] An improved algorithm for privacy-preserving data mining based on NMF
    Li, Guang
    Xi, Meng
    Journal of Information and Computational Science, 2015, 12 (09): : 3423 - 3430
  • [2] A new algorithm-independent method for privacy-preserving data mining
    Li, G. (hit6006@126.com), 1600, Binary Information Press (10):
  • [3] A Swarm-based Data Sanitization Algorithm in Privacy-Preserving Data Mining
    Ming-Tai, Jimmy
    Lin, Jerry Chun-Wei
    Djenouri, Youcef
    Fournier-Viger, Philippe
    Zhang, Yuyu
    2019 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2019, : 1461 - 1467
  • [4] An effective distributed privacy-preserving data mining algorithm
    Fukasawa, T
    Wang, JH
    Takata, T
    Miyazaki, M
    INTELLIGENT DAA ENGINEERING AND AUTOMATED LEARNING IDEAL 2004, PROCEEDINGS, 2004, 3177 : 320 - 325
  • [5] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [6] The density-based clustering method for privacy-preserving data mining
    Wu, Jimmy Ming-Tai
    Lin, Jerry Chun-Wei
    Fournier-Viger, Philippe
    Djenouri, Youcef
    Chen, Chun-Hao
    Li, Zhongcui
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (03) : 1718 - 1728
  • [7] Distributed Privacy-preserving Data Mining Method Research
    Chen, Qi
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 88 - 90
  • [8] A privacy-preserving classification mining algorithm
    Ge, WP
    Wang, W
    Li, XR
    Shi, B
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2005, 3518 : 256 - 261
  • [9] A Grid-Based Swarm Intelligence Algorithm for Privacy-Preserving Data Mining
    Wu, Tsu-Yang
    Lin, Jerry Chun-Wei
    Zhang, Yuyu
    Chen, Chun-Hao
    APPLIED SCIENCES-BASEL, 2019, 9 (04):
  • [10] Privacy-Preserving Data Mining Algorithm Based on Modified Particle Swarm Optimization
    Yang, Lei
    Wu, Jue
    Peng, Lingxi
    Liu, Feng
    INTELLIGENT COMPUTING METHODOLOGIES, 2014, 8589 : 529 - 541