Privacy Preservation of Time Series Data Using Discrete Wavelet Transforms

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 28)

Abstract

With the advent of latest data mining techniques, preserving the privacy of individual’s data became a persistent issue. Every day tremendous amount of data is being generated electronically with increasing concern of data privacy. Such data when gets disseminated among various data analysts, the privacy of individuals may be breached, as the released information may be personal and sensitive in nature. Irrespective of the type of data whether numerical, categorical, mixed, time series etc, accurate analyses of such data with privacy preservation is a pervasive task. And due to the complex nature of time series data, analyzing such kind of data without harming its privacy is an open and challenging issue. In this paper we have addressed the issue of analyzing records with preserved privacy, and the data under consideration are expressed in terms of numerical time series of equal length. We have developed a data perturbation method with wavelet representation of time series data. Our experimental results show that the proposed method is effective in preserving the trade-off between data utility and privacy of time series.

Keywords

Time series Discrete Wavelet Transform data privacy data utility 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aggarwal, C.C., Pei, J., Zhang, B.: On Privacy Preservation Against Adversarial Data Mining. In: 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 510–516 (2006)Google Scholar
  2. 2.
    Agrawal, R., Srikant, R.: Privacy-preserving Data Mining. ACM SIGMOD Record 29(2), 439–450 (2000)CrossRefGoogle Scholar
  3. 3.
    Chaovalit, P., Gangopadhyay, A., Karabatis, G., Chen, Z.: DiscreteWavelet Transform-Based Time Series Analysis and Mining. ACM Computing Surveys 43(2), 6:1–6:37 (2011)Google Scholar
  4. 4.
    Ciaccia, P., Patella, M., Zezula, P.: M-tree: An Efficient Access Method for Similarity Search in Metric Spaces. In: 23rdInternational Conference on Very Large Data Bases, pp. 426–435. Morgan Kaufmann Pub., Athens (1997)Google Scholar
  5. 5.
    Donoho, D.L.: De-noising by Soft-Thresholding. Information Theory 41(3), 613–627 (1995)MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Hea-Suk, K., Yang-Sae, M.: Fourier Magnitude-based Privacy-preserving Clustering on Time-Series Data. IEICE Transactions on Information and Systems 93(6), 1648–1651 (2010)Google Scholar
  7. 7.
    Inan, A., Kantarcioglu, M., Bertino, E.: Using Anonymized Data for Classification. In: Proceedings of 25th International Conference on Data Engineering, pp. 429–440 (2009)Google Scholar
  8. 8.
    Keogh, E., Folias, T.: The UCR Time-Series Data Mining Archive. Computer Science & Engineering Department. University of California, Riverside (2002), http://www.cs.ucr.edu/eamonn/TSDMA/index.html
  9. 9.
    M-Jung Choi, H.S.K., Moon, Y.S.: Publishing Sensitive Time-Series Data under Preservation of Privacy and Distance Orders. International Journal of Innovative Computing, Information and Control 8(5(B)), 3619–3638 (2012)Google Scholar
  10. 10.
    Möller-Levet, C.S., Klawonn, F., Cho, K.-H., Wolkenhauer, O.: Fuzzy Clustering of Short Time-Series and Unevenly Distributed Sampling Points. In: Berthold, M., Lenz, H.-J., Bradley, E., Kruse, R., Borgelt, C. (eds.) IDA 2003. LNCS, vol. 2810, pp. 330–340. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Mukherjee, S., Chen, Z., Gangopadhyay, A.: A Privacy-preserving Technique for Euclid-ean Distance-based Mining Algorithms using Fourier-related Transforms. The VLDB Journal 15(4), 293–315 (2006)CrossRefGoogle Scholar
  12. 12.
    Nin, J., Torra, V.: Extending Microaggregation Procedures for Time Series Protection. In: Greco, S., Hata, Y., Hirano, S., Inuiguchi, M., Miyamoto, S., Nguyen, H.S., Słowiński, R. (eds.) RSCTC 2006. LNCS (LNAI), vol. 4259, pp. 899–908. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    NSE: National Stock Exchange of India Limited (nse, india), http://www.nseindia.com/
  14. 14.
    Papadimitriou, S., Li, F., Kollios, G., Yu, P.S.: Time Series Compressibility and Privacy. In: 33rd International Conference on Very Large Data Bases, VLDB, pp. 459–470 (2007)Google Scholar
  15. 15.
    Singhal, A., Seborg, D.E.: Clustering Multivariate Time Series Data. Journal of Chemometric 19(8), 427–438 (2005)CrossRefGoogle Scholar
  16. 16.
    Wang, X., Smith, K.A., Hyndman, R., Alahakoon, D.: A Scalable Method for Time-Series Clustering. Technical Report, Department of Econometrics and Business Systems, Monash University, Victoria, Australia (2004)Google Scholar
  17. 17.
    Warren Liao, T.: Clustering of Time Series Data - A Survey. Pattern Recognition 38(11), 1857–1874 (2005)CrossRefMATHGoogle Scholar
  18. 18.
    Zhu, Y., Fu, Y., Fu, H.: On Privacy in Time Series Data Mining. In: Washio, T., Suzuki, E., Ting, K.M., Inokuchi, A. (eds.) PAKDD 2008. LNCS (LNAI), vol. 5012, pp. 479–493. Springer, Heidelberg (2008)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer Science Engineering and Information TechnologyAssam Don Bosco UniversityGuwahatiIndia
  2. 2.Department of Computer Science and EngineeringTezpur UniversityTezpurIndia

Personalised recommendations