Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2089856.2089888guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An attacker's view of distance preserving maps for privacy preserving data mining

Authors Info & Claims
Published:18 September 2006Publication History

ABSTRACT

We examine the effectiveness of distance preserving transformations in privacy preserving data mining. These techniques are potentially very useful in that some important data mining algorithms can be efficiently applied to the transformed data and produce exactly the same results as if applied to the original data e.g. distance-based clustering, k-nearest neighbor classification. However, the issue of how well the original data is hidden has, to our knowledge, not been carefully studied. We take a step in this direction by assuming the role of an attacker armed with two types of prior information regarding the original data. We examine how well the attacker can recover the original data from the transformed data and prior information. Our results offer insight into the vulnerabilities of distance preserving transformations.

References

  1. Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proc. ACM SIGMOD. (2000) 439-450 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: Random data perturbation techniques and privacy preserving data mining. Knowledge and Information Systems 7(5) (2005) 387-414 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proc. ACM SIGMOD. (2005) 37-48 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Sweeney, L.: K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10 (5) (2002) 557-570 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proc. IEEE ICDM. (2005) 589-592 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Oliveira, S.R.M., Zaïane, O.R.: Privacy preservation when sharing data for clustering. In: Proc. Workshop on Secure Data Management in a Connected World. (2004) 67-82Google ScholarGoogle Scholar
  7. Artin, M.: Algebra. Prentice Hall (1991)Google ScholarGoogle Scholar
  8. N. R. Adam, J.C.W.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys 21 (4) (1989) 515-556 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jolliffe, I.T.: Principal Component Analysis. Second edn. Springer Series in Statistics. Springer (2002)Google ScholarGoogle Scholar
  10. G. Strang: Linear Algebra and Its Applications (3rd Ed.). Harcourt Brace Jovanovich College Publishers, New York (1986)Google ScholarGoogle Scholar
  11. Szekély, G.J., Rizzo, M.L.: Testing for equal distributions in high dimensions. InterStat November(5) (2004)Google ScholarGoogle Scholar
  12. Vaidya, J., Clifton, C., Zhu, M.: Privacy Preserving Data Mining. Volume 19 of Series: Advances in Information Security. Springer (2006)Google ScholarGoogle Scholar
  13. Kim, J.J., Winkler, W.E.: Multiplicative noise for masking continuous data. Technical Report Statistics #2003-01, Statistical Research Division, U.S. Bureau of the Census (2003)Google ScholarGoogle Scholar
  14. Liu, K., Kargupta, H., Ryan, J.: Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering 18 (1) (2006) 92-106 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Evfimevski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proc. ACM PODS. (2003) Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: Proc. 28th VLDB. (2002) 682-693 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Hore, B., Mehrotra S., Tsudik G.: A privacy-preserving index for range queries. In: Proc. 30th VLDB. (2004) 720-731 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Verykios, V.S., Elmagarmid, A.K., Elisa, B., Saygin, Y., Elena, D.: Association rule hiding. IEEE Transactions on Knowledge and Data Engineering 16 (4) (2004) 434-447 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Fienberg, S.E., McIntyre, J.: Data swapping: Variations on a theme by dalenius and reiss. Technical report, U.S. National Institute of Statistical Sciences (2003)Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image Guide Proceedings
    PKDD'06: Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
    September 2006
    658 pages
    ISBN:3540453741
    • Editors:
    • Johannes Fürnkranz,
    • Tobias Scheffer,
    • Myra Spiliopoulou

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    • Published: 18 September 2006

    Qualifiers

    • Article