Achieving Privacy Preservation when Sharing Data for Clustering
نویسندگان
چکیده
In this paper, we address the problem of protecting the underlying attribute values when sharing data for clustering. The challenge is how to meet privacy requirements and guarantee valid clustering results as well. To achieve this dual goal, we propose a novel spatial data transformation method called Rotation-Based Transformation (RBT). The major features of our data transformation are: a) it is independent of any clustering algorithm, b) it has a sound mathematical foundation; c) it is efficient and accurate; and d) it does not rely on intractability hypotheses from algebra and does not require CPU-intensive operations. We show analytically that although the data are transformed to achieve privacy, we can also get accurate clustering results by the safeguard of the global distances between
منابع مشابه
A Privacy Preserving Clustering Method Based on Fuzzy Approach and Random Rotation Perturbation
Individual privacy issues arise in these days when organizations using clustering as a data analysis tool. Private and sensitive data available in criminal, healthcare and financial records need to be preserved and also avoid the privacy leakage with the data mining system. In this paper, a privacy preserving clustering method is proposed for protecting the underlying sensitive attribute values...
متن کاملPrivacy Preserving Probabilistic Possibilistic Fuzzy C Means Clustering
Due to this uncontrollable growth of data, clustering played major role to partition into a small sets to do relevant processes within the small sets. Recently, the privacy and security are extra vital essentials when data is large and the data is distributed to other sources for various purposes. According to that, the privacy preservation should be done before distributing the data. In this s...
متن کاملPrivacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach
AbstrAct While the sharing of data is known to be beneficial in data mining applications and widely acknowledged as advantageous in business, this information sharing can become controversial and thwarted by privacy regulations and other privacy concerns. Data clustering for instance could be more accurate if more information is available, hence the data sharing. Any solution needs to balance t...
متن کاملPrivacy of Data, Preserving in Data Mining
Huge volume of detailed personal data is regularly collected and sharing of these data is proved to be beneficial for data mining application. Such data include shopping habits, criminal records,medical history, credit records etc .On one hand such data is an important asset to business organization and governments for decision making by analyzing it .On the other hand privacy regulations and o...
متن کاملPrivacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme
In this article, the authors propose an approach for privacy preserving distributed clustering that assumes malicious model. In the literature, there do exist, numerous approaches that assume a semi honest model. However, such an assumption is, at best, reasonable in experimentations; rarely true in real world. Hence, it is essential to investigate approaches for privacy preservation using a ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004