2007 Canadian Conference on Electrical and Computer Engineering 2007
DOI: 10.1109/ccece.2007.83
|View full text |Cite
|
Sign up to set email alerts
|

On Data Distortion for Privacy Preserving Data Mining

Abstract: Because of the increasing ability to trace and collect large amount of personal information, privacy preserving in data mining applications has become an important concern. Data perturbation is one of the well known techniques for privacy preserving data mining.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…However as, like any perturbation approach, such changes could affect some important information (i.e., lose data utility), obtaining a balance between data protection and utility is still a significant challenge [7], [32]. Various studies for maintaining the privacy of data-driven devices in different applications, such as that of Kabir et al [33], use the Non-negative Matrix Factorisation (NMF) and sparseness constraint to hide sensitive information. This constraint provides a sparse data representation in which a predefined threshold is set to control the level of data distortion.…”
Section: ) Signal Distortionmentioning
confidence: 99%
“…However as, like any perturbation approach, such changes could affect some important information (i.e., lose data utility), obtaining a balance between data protection and utility is still a significant challenge [7], [32]. Various studies for maintaining the privacy of data-driven devices in different applications, such as that of Kabir et al [33], use the Non-negative Matrix Factorisation (NMF) and sparseness constraint to hide sensitive information. This constraint provides a sparse data representation in which a predefined threshold is set to control the level of data distortion.…”
Section: ) Signal Distortionmentioning
confidence: 99%
“…As a result, we choose to develop ways to perturb the objective function and then we can easily apply the Laplace mechanism to preserve differential privacy. Let us first start with a simple approach which directly adds Laplace noise to the parameters (w, α) [13], as described in Algorithm 1.…”
Section: Output Function Perturbation Approach (Ofpa)mentioning
confidence: 99%
“…The most possible of using multiplicative random projection matrices for privacy preserving distributed data mining for computing statistical aggregates like the inner product matrix, correlation coefficient matrix, and Euclidean distance matrix from distributed privacy sensitive data is explored. The scope of perturbation-based PPDM to Multilevel Trust (MLT-PPDM) is expanded in [9] which are robust against diversity attacks with respect to the privacy goal. In [12] a kind of privacy preserving classification mining method based on the random perturbation matrix is proposed which is suitable to the data of character type, Boolean type, classified type and digital type.…”
Section: Perturbation Algorithmsmentioning
confidence: 99%