Skip to main content

Providing Group Anonymity Using Wavelet Transform

  • Conference paper
Data Security and Security Data (BNCOD 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6121))

Included in the following conference series:

Abstract

Providing public access to unprotected digital data can pose a threat of unwanted disclosing the restricted information.

The problem of protecting such information can be divided into two main subclasses, namely, individual and group data anonymity. By group anonymity we define protecting important data patterns, distributions, and collective features which cannot be determined through analyzing individual records only.

An effective and comparatively simple way of solving group anonymity problem is doubtlessly applying wavelet transform. It’s easy-to-implement, powerful enough, and might produce acceptable results if used properly.

In the paper, we present a novel method of using wavelet transform for providing group anonymity; it is gained through redistributing wavelet approximation values, along with simultaneous fixing data mean value and leaving wavelet details unchanged (or proportionally altering them). Moreover, we provide a comprehensive example to illustrate the method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gantz, J.F., Reinsel, D.: As the Economy Contracts, the Digital Universe Expands. An IDC Multimedia White Paper (2009), http://www.emc.com/collateral/demos/microsites/idc-digital-universe/iview.htm

  2. Mullins, I., Siadaty, M., Lyman, J., Scully, K., Garrett, C., Miller, W., Muller, R., Robson, B., Apte, C., Weiss, S., Rigoutsos, I., Platt, D., Cohen, S., Knaus, W.: Data Mining and Clinical Data Repositories: Insights from a 667,000 Patient Data Set. Computers in Biology and Medicine 36(12), 1351–1377 (2006)

    Article  Google Scholar 

  3. Minnesota Population Center. Integrated Public Use Microdata Series International, https://international.ipums.org/international/

  4. Health Insurance Portability and Accountability Act of 1996 (HIPAA). Public Law 104-191, 104th Congress, August 21 (1996), http://www.hipaa.org/

  5. Patient Safety and Quality Improvement Act of 2005 (PSQIA). Federal Register 73(266) (2001)

    Google Scholar 

  6. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002. Official Journal of the European Communities L 201, 37–47 (July 31, 2002)

    Google Scholar 

  7. Chertov, O., Pilipyuk, A.: Statistical Disclosure Control Methods for Microdata. In: International Symposium on Computing, Communication and Control, pp. 338–342. IACSIT, Singapore (2009)

    Google Scholar 

  8. Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: ACM SIGMOD International Conference on Management of Data, pp. 439–450. ACM Press, Dallas (2000)

    Google Scholar 

  9. Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical Data-oriented Microaggregation for Statistical Disclosure Control. IEEE Transactions on Knowledge and Data Engineering 14(1), 189–201 (2002)

    Article  Google Scholar 

  10. Fienberg, S., McIntyre, J.: Data Swapping: Variations on a Theme by Dalenius and Reiss. Technical Report, National Institute of Statistical Sciences (2003)

    Google Scholar 

  11. Domingo-Ferrer, J.: A Survey of Inference Control Methods for Privacy-Preserving Data Mining. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining: Models and Algorithms, pp. 53–80. Springer, New York (2008)

    Chapter  Google Scholar 

  12. Xu, S., Zhang, J., Han, D., Wang, J.: Singular Value Decomposition Based Data Distortion Strategy for Privacy Protection. Knowledge and Information Systems 10(3), 383–397 (2006)

    Article  Google Scholar 

  13. Wang, J., Zhong, W.J., Zhang, J.: NNMF-based Factorization Techniques for High-accuracy Privacy Protection on Non-negative-valued Datasets. In: IEEE Conference on Data Mining, International Workshop on Privacy Aspects of Date Mining, pp. 513–517. IEEE Computer Society, Washington (2006)

    Google Scholar 

  14. Liu, L., Wang, J., Lin, Z., Zhang, J.: Wavelet-Based Data Distortion for Privacy-Preserving Collaborative Analysis. Technical Report No. 482-07, Department of Computer Science, University of Kentucky, Lexington (2007)

    Google Scholar 

  15. Davydov, A.: Wavelet-analysis of the Social Processes. Sotsiologicheskie issledovaniya 11, 89–101 (2003) (in Russian), http://www.ecsocman.edu.ru/images/pubs/2007/10/30/0000315095/012.DAVYDOV.pdf

    Google Scholar 

  16. The Free Haven Project, http://freehaven.net/anonbib/full/date.html

  17. Evfimievski, A.: Randomization in Privacy Preserving Data Mining. ACM SIGKDD Explorations Newsletter 4(2), 43–48 (2002)

    Article  Google Scholar 

  18. Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: Random-data Perturbation Techniques and Privacy-preserving Data Mining. Knowledge and Information Systems 7(4), 387–414 (2005)

    Article  Google Scholar 

  19. Aggarwal, C.C.: On Randomization, Public Information and the Curse of Dimensionality. In: 23rd International Conference on Data Enginering, pp. 136–145. IEEE Computer Society, Washington (2007)

    Google Scholar 

  20. Sweeney, L.: k-anonymity: a Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)

    Article  MATH  Google Scholar 

  21. Mallat, S.: A Wavelet Tour of Signal Processing. Academic Press, New York (1999)

    MATH  Google Scholar 

  22. Strang, G., Nguyen, T.: Wavelet and Filter Banks. Wellesley-Cambridge Press, Wellesley (1997)

    MATH  Google Scholar 

  23. Li, T., Li, Q., Zhu, S., Ogihara, M.: A Survey on Wavelet Applications in Data Mining. ACM SIGKDD Explorations Newsletter 4(2), 49–68 (2002)

    Article  Google Scholar 

  24. Bapna, S., Gangopadhyay, A.: A Wavelet-based Approach to Preserve Privacy for Classification Mining. Decision Sciences Journal 37(4), 623–642 (2006)

    Article  Google Scholar 

  25. Liu, L., Wang, J., Zhang, J.: Wavelet-based Data Perturbation for Simultaneous Privacy-Preserving and Statistics-Preserving. In: 2008 IEEE International Conference on Data Mining Workshops, pp. 27–35. IEEE Computer Society, Washington (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chertov, O., Tavrov, D. (2012). Providing Group Anonymity Using Wavelet Transform. In: MacKinnon, L.M. (eds) Data Security and Security Data. BNCOD 2010. Lecture Notes in Computer Science, vol 6121. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25704-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25704-9_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25703-2

  • Online ISBN: 978-3-642-25704-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics