Abstract
Perturbation-based techniques are studied extensively in context of privacy preserving data mining. In this technique, random noise is added to the original distribution for privacy sensitive data. Next, they are sent to the data miner who will reconstruct the original data distribution from the perturbed sets. Perturbation approaches project a trade-off between applicability of data versus privacy achieved. Also, different entities participating in collaborative data mining have different attitudes toward privacy based on their country’s customs and traditions. Contemporary-based perturbation techniques do not allow the participating entities to choose the privacy levels needed by them. This is main motivation our work. This paper presents a privacy level-based perturbation model opening new avenues for future work in this direction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrawal, D., & Agrawal, C. C. (2001). On the design and quantification of privacy preserving data mining algorithms. In PODS, ACM.
Kargupta, H., Dutta, S., Wang, Q., & Sivakumar, K. (2003). On privacy preserving properties of random data perturbation techniques. In ICDM, IEEE Computer Society, 2003 (pp. 99–106).
Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. In Proceedings ACM SIGMOD, 2000, (pp. 439–450).
Alpa, K. S., & Ravi, G. (2015). Contemporary trends in privacy preserving collaborative data mining– a survey. In IEEE-International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)-2015 held on 24th and 25th January 2015.
Elkan, C. (1997). Boosting and naive bayesian learning, technical report CS97-557. San Diego: University of California.
Rivest, R., Adleman, L., & Dertouzos, M. (1978). On data banks and privacy homomorphisms. In R. A. DeMillo et al. (Eds.), Foundations of Secure Computation (pp. 169–179). London: Academic Press.
Justin, Z. (2008). Privacy preserving collaborative data mining. IEEE Computational Intelligence Magazine.
Murat, K., & Chris, C. (2004). Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9).
Lindell, Y., & Pinkas, B. (2000). Privacy preserving data mining. Journal of Cryptology, 15(3), 177–206.
Huang, Z., Du, W., & Chen, B. (2005). Deriving private information from randomized data. In SIGMOD Conference, 2005 (pp. 37–48).
Liu, K., Kargupta, H., & Ryan, J. (2006). Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering (TKDE), 18(1), 92–106. doi:10.1109/TKDE.2006.14.
Liu, K., Giannella, C., & Kargupta, H. (2006). An attacker’s view of distance preserving maps for privacy preserving data mining. In Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD’06), Berlin, Germany, 2006.
Yao, A. C. (1982). Protocols for secure computations. In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, 1982.
Willenborg, L., & Waal, T. (2001). Elements of statistical disclosure control. In Lecture Notes in Statistics (Vol. 155). New York: Springer.
Du, W. & Atallah, M. J. (2001). Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigms Workshop (pp. 11–20).
Vaidya, J., & Clifton, C. (2002). Privacy preserving association rule mining in vertically partitioned data. In Eight ACM SIGKDD International conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, CA July 2002.
Kantaracioglu, M. & Clifton, C. (2002). Privacy preserving distributed mining of association rules on horizontally partitioned data. In SiGMOD Workshop on DMKD, Madison, WI, June 2002.
Yehuda, L. (2001). Parallel coin-tossing and constant round secure two-party computation. Journal of Cryptology.
Zhan, Z., & Chang, L. (2008). Privacy-preserving collaborative data mining (pp. 21–31). Computational Intelligence Magazine: IEEE Journals and Magazine.
Du, W. & Attalah, M. J. (2001). Privacy-preserving cooperative scientific computations. In 14th IEEE Computer Security Foundation Workshop, June 11–13, 2001.
Evfimievski, A., Gehrke, J. & Srikant, R. (2003). Limiting privacy breaches in privacy preserving data mining. In Proceedings ACM Conference Principles of Database Systems (PODS), 2003.
Jagannathan, G., & Wright, R. N. (2005). Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In Proceedings ACM SIGKDD, 2005.
Alpa, K. S., & Ravi, G. (2015). Privacy, collaboration and security – imperative existence in data mining. In VNSGU Journal of Science and Technology (ISSN 0975-5446), February 2015.
Li, L., Murat, K., & Bhavani, T. (2007). The applicability of the perturbation based privacy preserving data mining for real-world data. In Data Knowledge and Engineering. Elsevier.
Keke, C., & Ling, L. (2009). Privacy-preserving multiparty collaborative mining with geometric data perturbation. IEEE Transactions on Parallel and Distributed Systems, 20(12).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Shah, A.K., Gulati, R. (2016). Privacy-Leveled Perturbation Model for Privacy Preserving Collaborative Data Mining. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 409. Springer, Singapore. https://doi.org/10.1007/978-981-10-0135-2_22
Download citation
DOI: https://doi.org/10.1007/978-981-10-0135-2_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0133-8
Online ISBN: 978-981-10-0135-2
eBook Packages: EngineeringEngineering (R0)