Skip to main content

Privacy-Leveled Perturbation Model for Privacy Preserving Collaborative Data Mining

  • Conference paper
  • First Online:
Proceedings of International Conference on ICT for Sustainable Development

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 409))

Abstract

Perturbation-based techniques are studied extensively in context of privacy preserving data mining. In this technique, random noise is added to the original distribution for privacy sensitive data. Next, they are sent to the data miner who will reconstruct the original data distribution from the perturbed sets. Perturbation approaches project a trade-off between applicability of data versus privacy achieved. Also, different entities participating in collaborative data mining have different attitudes toward privacy based on their country’s customs and traditions. Contemporary-based perturbation techniques do not allow the participating entities to choose the privacy levels needed by them. This is main motivation our work. This paper presents a privacy level-based perturbation model opening new avenues for future work in this direction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrawal, D., & Agrawal, C. C. (2001). On the design and quantification of privacy preserving data mining algorithms. In PODS, ACM.

    Google Scholar 

  2. Kargupta, H., Dutta, S., Wang, Q., & Sivakumar, K. (2003). On privacy preserving properties of random data perturbation techniques. In ICDM, IEEE Computer Society, 2003 (pp. 99–106).

    Google Scholar 

  3. Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. In Proceedings ACM SIGMOD, 2000, (pp. 439–450).

    Google Scholar 

  4. Alpa, K. S., & Ravi, G. (2015). Contemporary trends in privacy preserving collaborative data mining– a survey. In IEEE-International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)-2015 held on 24th and 25th January 2015.

    Google Scholar 

  5. Elkan, C. (1997). Boosting and naive bayesian learning, technical report CS97-557. San Diego: University of California.

    Google Scholar 

  6. Rivest, R., Adleman, L., & Dertouzos, M. (1978). On data banks and privacy homomorphisms. In R. A. DeMillo et al. (Eds.), Foundations of Secure Computation (pp. 169–179). London: Academic Press.

    Google Scholar 

  7. Justin, Z. (2008). Privacy preserving collaborative data mining. IEEE Computational Intelligence Magazine.

    Google Scholar 

  8. Murat, K., & Chris, C. (2004). Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9).

    Google Scholar 

  9. Lindell, Y., & Pinkas, B. (2000). Privacy preserving data mining. Journal of Cryptology, 15(3), 177–206.

    Article  MathSciNet  Google Scholar 

  10. Huang, Z., Du, W., & Chen, B. (2005). Deriving private information from randomized data. In SIGMOD Conference, 2005 (pp. 37–48).

    Google Scholar 

  11. Liu, K., Kargupta, H., & Ryan, J. (2006). Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering (TKDE), 18(1), 92–106. doi:10.1109/TKDE.2006.14.

    Article  Google Scholar 

  12. Liu, K., Giannella, C., & Kargupta, H. (2006). An attacker’s view of distance preserving maps for privacy preserving data mining. In Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD’06), Berlin, Germany, 2006.

    Google Scholar 

  13. Yao, A. C. (1982). Protocols for secure computations. In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, 1982.

    Google Scholar 

  14. Willenborg, L., & Waal, T. (2001). Elements of statistical disclosure control. In Lecture Notes in Statistics (Vol. 155). New York: Springer.

    Google Scholar 

  15. Du, W. & Atallah, M. J. (2001). Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigms Workshop (pp. 11–20).

    Google Scholar 

  16. Vaidya, J., & Clifton, C. (2002). Privacy preserving association rule mining in vertically partitioned data. In Eight ACM SIGKDD International conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, CA July 2002.

    Google Scholar 

  17. Kantaracioglu, M. & Clifton, C. (2002). Privacy preserving distributed mining of association rules on horizontally partitioned data. In SiGMOD Workshop on DMKD, Madison, WI, June 2002.

    Google Scholar 

  18. Yehuda, L. (2001). Parallel coin-tossing and constant round secure two-party computation. Journal of Cryptology.

    Google Scholar 

  19. Zhan, Z., & Chang, L. (2008). Privacy-preserving collaborative data mining (pp. 21–31). Computational Intelligence Magazine: IEEE Journals and Magazine.

    Google Scholar 

  20. Du, W. & Attalah, M. J. (2001). Privacy-preserving cooperative scientific computations. In 14th IEEE Computer Security Foundation Workshop, June 11–13, 2001.

    Google Scholar 

  21. Evfimievski, A., Gehrke, J. & Srikant, R. (2003). Limiting privacy breaches in privacy preserving data mining. In Proceedings ACM Conference Principles of Database Systems (PODS), 2003.

    Google Scholar 

  22. Jagannathan, G., & Wright, R. N. (2005). Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In Proceedings ACM SIGKDD, 2005.

    Google Scholar 

  23. Alpa, K. S., & Ravi, G. (2015). Privacy, collaboration and security – imperative existence in data mining. In VNSGU Journal of Science and Technology (ISSN 0975-5446), February 2015.

    Google Scholar 

  24. Li, L., Murat, K., & Bhavani, T. (2007). The applicability of the perturbation based privacy preserving data mining for real-world data. In Data Knowledge and Engineering. Elsevier.

    Google Scholar 

  25. Keke, C., & Ling, L. (2009). Privacy-preserving multiparty collaborative mining with geometric data perturbation. IEEE Transactions on Parallel and Distributed Systems, 20(12).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alpa Kavin Shah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Shah, A.K., Gulati, R. (2016). Privacy-Leveled Perturbation Model for Privacy Preserving Collaborative Data Mining. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 409. Springer, Singapore. https://doi.org/10.1007/978-981-10-0135-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0135-2_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0133-8

  • Online ISBN: 978-981-10-0135-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics