Quantification of a Privacy Preserving Data Mining Transformation
نویسنده
چکیده
Data mining, with its promise to extract valuable, previously unknown and potentially useful patterns or knowledge from large data sets that contain private information is vulnerable to misuse. To protect the private or sensitive information, many privacypreserving data mining (PPDM) techniques have emerged. A large fraction of these techniques use randomized data distortion by adding noise from a known distribution function (e.g., uniform, normal) to the sensitive data. However, non-careful noise addition may introduce biases to the statistical parameters of these data. To preserve the statistical properties and meet privacy requirements of the sensitive data, we use a data transformation technique called Rotation–Based Transformation (RBT). This method distorts only private numerical attributes and preserves the statistical properties of the data. KeywordsData mining, Privacy, Data transformation.
منابع مشابه
A Survey: Privacy Preservation Data Mining Techniques and Geometric Transformation
What is Privacy Preserving Data Mining is the process of hiding and protecting sensitive data of individuals. In the recent era, we use many applications which require personal sensitive data of individuals. Thus, people are more concern about sharing their personal sensitive information due to increase of privacy intrusions. Since last two decades many Privacy Preserving Data Mining techniques...
متن کاملPrincipal Component Analysis Based Transformation for Privacy Preserving in Data Stream Mining
Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web searches and sensor data etc. The data owners or publishers may not be willing to exactly reveal the true values of their data due to various reasons, most notably privacy consider...
متن کاملModelling Extraction Transformation Load embedding Privacy Preservation using UML
Extraction Transformation Load plays an important phase in development of data warehouse due its complexity of selecting data from different location and having different structures. The recent industry of data warehouse is driven by Privacy Preserving Data Mining which ensures privacy of sensitive information during Mining and is a requirement of most Data Bases. Current approaches to modellin...
متن کاملMitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
The rotation based transformation (RBT) for privacy preserving data mining (PPDM) is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple rotation based transformation (MRBT) technique for special mining applications mitigating the ICA attack while maintaining the advantages of the RBT.
متن کاملPrivacy-preserving Clustering of Data Streams
As most previous studies on privacy-preserving data mining placed specific importance on the security of massive amounts of data from a static database, consequently data undergoing privacy-preservation often leads to a decline in the accuracy of mining results. Furthermore, following by the rapid advancement of Internet and telecommunication technology, subsequently data types have transformed...
متن کامل