Quantification of a Privacy Preserving Data Mining Transformation

نویسنده

  • Mohammed Ketel
چکیده

Data mining, with its promise to extract valuable, previously unknown and potentially useful patterns or knowledge from large data sets that contain private information is vulnerable to misuse. To protect the private or sensitive information, many privacypreserving data mining (PPDM) techniques have emerged. A large fraction of these techniques use randomized data distortion by adding noise from a known distribution function (e.g., uniform, normal) to the sensitive data. However, non-careful noise addition may introduce biases to the statistical parameters of these data. To preserve the statistical properties and meet privacy requirements of the sensitive data, we use a data transformation technique called Rotation–Based Transformation (RBT). This method distorts only private numerical attributes and preserves the statistical properties of the data. KeywordsData mining, Privacy, Data transformation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey: Privacy Preservation Data Mining Techniques and Geometric Transformation

What is Privacy Preserving Data Mining is the process of hiding and protecting sensitive data of individuals. In the recent era, we use many applications which require personal sensitive data of individuals. Thus, people are more concern about sharing their personal sensitive information due to increase of privacy intrusions. Since last two decades many Privacy Preserving Data Mining techniques...

متن کامل

Principal Component Analysis Based Transformation for Privacy Preserving in Data Stream Mining

Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web searches and sensor data etc. The data owners or publishers may not be willing to exactly reveal the true values of their data due to various reasons, most notably privacy consider...

متن کامل

Modelling Extraction Transformation Load embedding Privacy Preservation using UML

Extraction Transformation Load plays an important phase in development of data warehouse due its complexity of selecting data from different location and having different structures. The recent industry of data warehouse is driven by Privacy Preserving Data Mining which ensures privacy of sensitive information during Mining and is a requirement of most Data Bases. Current approaches to modellin...

متن کامل

Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering

The rotation based transformation (RBT) for privacy preserving data mining (PPDM) is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple rotation based transformation (MRBT) technique for special mining applications mitigating the ICA attack while maintaining the advantages of the RBT.

متن کامل

Privacy-preserving Clustering of Data Streams

As most previous studies on privacy-preserving data mining placed specific importance on the security of massive amounts of data from a static database, consequently data undergoing privacy-preservation often leads to a decline in the accuracy of mining results. Furthermore, following by the rapid advancement of Internet and telecommunication technology, subsequently data types have transformed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006