2013
DOI: 10.1007/s10619-013-7126-6
|View full text |Cite
|
Sign up to set email alerts
|

A generic and distributed privacy preserving classification method with a worst-case privacy guarantee

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 27 publications
0
1
0
Order By: Relevance
“…R is considered as the orthonormal rotation matrix. Ultimately, the perturbed data are the resolution of product X by R. Many advances are brought out in this kind of techniques using classification (Chen, 2005;Banerjee, 2014) and transformation techniques such as SVM, KNN, K-means, Inner product and kernel methods.…”
Section: Random Rotation Based Perturbationmentioning
confidence: 99%
“…R is considered as the orthonormal rotation matrix. Ultimately, the perturbed data are the resolution of product X by R. Many advances are brought out in this kind of techniques using classification (Chen, 2005;Banerjee, 2014) and transformation techniques such as SVM, KNN, K-means, Inner product and kernel methods.…”
Section: Random Rotation Based Perturbationmentioning
confidence: 99%
“…Most existing privacy‐preserving methods for distance‐based mining are transformation based; in the worst case, the transformation may be recovered by attackers, and the original data will be compromised . In addition, another significant drawback with existing methods is that they are often quite expensive because of the use of encryption operations . In view of the limitations posed by the present approaches, there is a need to propose reliable and efficient privacy‐preserving approaches that achieve the tradeoff between data privacy and mining quality.…”
Section: Related Workmentioning
confidence: 99%
“…In this algorithm, homomorphism encryption, digital envelope and difference comparison method was used to protect the data privacy. In Part 1, the computational overhead mainly includes: O (1) for key generation [14], O (1) for encryption process, O (1) for generate t random numbers, O ( nlog(n) ) for the sorting of n numbers [15], O (n) for communication complexity, so the complexity of the whole is O ( nlog(n) ) + O (n). In Part 2, the communication complexity is O (t), computational complexity, including: O (1) for generating random numbers, O (n) for calculation process; the overall complexity is O (t) + O (n).…”
Section: Analysis Of Performanmentioning
confidence: 99%