An Improvement of Privacy-Preserving Scheme Based on Random Substitutions

نویسنده

  • Ju-Sung Kang
چکیده

Data perturbation techniques are one of the most popular models for privacy-preserving data mining due to their practical utility [1]. In a typical data perturbation, before the data owner publishes the data, they randomly change the data in certain way to disguise the private information while preserving some statistical properties for obtaining meaningful data mining models. Agrawal and Haritsa [2] have proposed a generalized matrix-theoretic framework of random perturbation that facilitates a systematic approach to the design of random substitutions. They used a privacy measure called ρ1-to-ρ2 privacy breach [5], and chose a special type of optimal perturbation matrix called the γ-diagonal matrix. Agrawal and Haritsa [2] explored their framework in the context of privacy-preserving association rule mining, and Dowd et al. [4] extended the results to privacy-preserving decision tree mining. Also the authors of [4] explained that random substitution with γ-diagonal matrix is fundamentally different from adding noise and it is secure against data-recovery attacks of [7] and [6]. In this research we discuss a theoretical upper bound of the estimation error for the matrix-based random perturbation method, and concretely examine the relationship among the parameters used in the random substitutions by γ-diagonal matrices. Moreover we propose a method of improving the accuracy of random substitutions and theoretically analyze its effect of improvement on the view point of the estimation error.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks

Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J. Horng et al., An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks, Information Sciences 317 (2015) 48-66] proposed an efficient certificateless aggregate signature with condi...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Privacy-Preserving Decision Tree Mining Based on Random Substitutions

Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacypreserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentally flawed [2]. However, since the general framework presented in [1] has some nice and useful featu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009