Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining

被引:0
作者
Yuan-Hung Kao
Wei-Bin Lee
Tien-Yu Hsu
Chen-Yi Lin
Hui-Fang Tsai
Tung-Shou Chen
机构
[1] Feng Chia University,Department of Information Engineering and Computer Science
[2] National Museum of Natural Science,Department of Operation, Visitor Service, Collection and Information Manage
[3] National Taichung University of Science and Technology,Department of Information Management
[4] Chung Shan Medical University,School of Medical Laboratory and Biotechnology
[5] National Taichung University of Science and Technology,Department of Computer Science and Information Engineering
来源
Journal of Medical and Biological Engineering | 2015年 / 35卷
关键词
Cloud computing; Big data; Reversible data hiding; Data perturbation;
D O I
暂无
中图分类号
学科分类号
摘要
Data mining has become an important service in cloud computing. Privacy-preserving schemes must be applied to the original data before data owners provide data publicly or send the data to remote servers for mining in order to avoid improper disclosure of privacy data. Previous studies have applied data perturbation approaches to modify the content of the original data; however, this might affect the accuracy of the mining results. To solve this issue, this study develops the reversible privacy contrast mapping (RPCM) algorithm, which applies the reversible data hiding techniques used in image processing to perturb and restore data. Furthermore, to identify whether perturbed data have been modified without authorization, RPCM allows users to embed watermarks in the data. The experimental results show that the knowledge contained in the data perturbed using RPCM is similar to that in the original data. The privacy disclosure risk does not increase when the degree of data perturbation increases.
引用
收藏
页码:789 / 794
页数:5
相关论文
共 48 条
[1]  
Lin CH(2013)A multi-level cloud-based virtual health exam system on health cloud Journal of Medical and Biological Engineering 33 373-379
[2]  
Tseng PH(2013)SVD based data transformation methods for privacy preserving clustering International Journal of Computers and Applications 78 39-43
[3]  
Huang LC(2013)Privacy-preserving disjunctive normal form operations on distributed sets Information Sciences 231 113-122
[4]  
Oyang YJ(2007)Anonymizing classification data for privacy preservation IEEE Transactions on Knowledge and Data Engineering 19 711-725
[5]  
Wu MS(2006)Random projection-based multiplicative data perturbation for privacy preserving distributed data mining IEEE Transactions on Knowledge and Data Engineering 18 92-106
[6]  
Chou SCT(2010)A novel anonymization algorithm: Privacy protection and knowledge Preservation Expert Systems with Applications 37 756-766
[7]  
Lakshmi MN(2009)Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining Decision Support Systems 48 133-140
[8]  
Rani KS(2010)Classifying data from protected statistical datasets Computers Security 29 874-890
[9]  
Chun JY(2011)Preserving privacy in data mining using data distortion approach International Journal of Computational Engineering Science 1 24-31
[10]  
Hong D(2005)Probabilistic information loss measures in confidentiality protection of continuous microdata Data Mining and Knowledge Discovery 11 181-193