DOI QR코드

DOI QR Code

Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering

  • Received : 2009.06.09
  • Accepted : 2010.01.04
  • Published : 2010.06.30

Abstract

Multiple rotation-based transformation (MRBT) was introduced recently for mitigating the apriori-knowledge independent component analysis (AK-ICA) attack on rotation-based transformation (RBT), which is used for privacy-preserving data clustering. MRBT is shown to mitigate the AK-ICA attack but at the expense of data utility by not enabling conventional clustering. In this paper, we extend the MRBT scheme and introduce an augmented rotation-based transformation (ARBT) scheme that utilizes linearity of transformation and that both mitigates the AK-ICA attack and enables conventional clustering on data subsets transformed using the MRBT. In order to demonstrate the computational feasibility aspect of ARBT along with RBT and MRBT, we develop a toolkit and use it to empirically compare the different schemes of privacy-preserving data clustering based on data transformation in terms of their overhead and privacy.

Keywords

References

  1. M. F. Mokbel, "Privacy in Location-Based Services: State-of-the-Art and Research Directions," Proc. MDM, 2007, pp. 228-229.
  2. M. Goebel and L. Gruenwald, "A Survey of Data Mining and Knowledge Discovery Software Tools," SIGKDD Explorations, vol. 1, no. 1, 1999, pp. 20-33. https://doi.org/10.1145/846170.846172
  3. R. Agrawal and R. Srikant, "Privacy Preserving Data Mining," Proc. ACM SIGMOD, 2000, pp. 439-450.
  4. A. Mohaisen and D. Hong, "Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering," ETRI J., vol. 30, no. 6, 2008, pp. 868-870. https://doi.org/10.4218/etrij.08.0208.0134
  5. S.R.M. Oliveira and O.R. Zaïane, "Achieving Privacy Preservation When Sharing Data for Clustering," Proc. SDM, 2004, pp. 67-82.
  6. K. Liu, H. Kargupta, and J. Ryan, "Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, 2006, pp. 92-106. https://doi.org/10.1109/TKDE.2006.14
  7. E. Bertino, I. Fovino, and L.P. Provenza, "A Framework for Evaluating Privacy Preserving Data Mining Algorithms," Data Min. Knowl. Discov., vol. 11, no. 2, 2005, pp. 121-154. https://doi.org/10.1007/s10618-005-0006-6
  8. K. Chen and L. Liu, "Privacy Preserving Data Classification with Rotation Perturbation," Proc. ICDM, 2005, pp. 589-592.
  9. S. Guo and X. Wu, "Deriving Private Information from Arbitrarily Projected Data," Proc. PAKDD, 2007, pp. 84-95.
  10. N. Zhang, W. Zhao, and J. Chen, "Performance Measurements for Privacy Preserving Data Mining," Proc. PAKDD, 2005, pp. 43-49.
  11. N Zhang, S. Wang, and W. Zhao, "A New Scheme on Privacy-Preserving Data Classification," Proc. KDD, 2005, pp. 374-383.
  12. H. Kargupta, K. Das, and K. Liu, "Multi-Party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework," Proc. PKDD, 2007, pp. 523-531.
  13. H. Garcia-Molina, J.D. Ullman, and J. Widom, Database Systems: The Complete Book, Prentice Hall, 2001, pp. 61-65.
  14. S.K. Gupta, K.S. Rao, and V. Bhatnagar, "K-Means Clustering for Categorical Attributes," Proc. DaWaK, 1999, pp. 203-208.
  15. L. Xiong, S. Chitti, and L. Liu, "Mining Multiple Private Databases Using a kNN Classifier," Proc. SAC, 2007, pp. 435-440.
  16. A. Evfimievski et al., "Privacy Preserving Mining of Association Rules," Proc. KDD, 2002, pp. 217-228.
  17. J.L. Lin and J.Y.C. Liu, "Privacy Preserving Itemset Mining through Fake Transactions," Proc. SAC, 2007, pp. 375-379.
  18. H. Jin et al., "Privacy-Preserving Sequential Pattern Release," Proc. PAKDD, 2007, pp. 547-554.
  19. M. Atzori et al., "Towards Low-Perturbation Anonymity Preserving Pattern Discovery," Proc. SAC, 2006, pp. 588-592.
  20. K. Liu, H. Kargupta, and J. Ryan, "Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, 2006, pp. 929-106.
  21. A. Hyvarinen, J. Karhunen, and E. Oja, "Independent Component Analysis," Proc. Conf. Uncertainty in Artificial Intelligence, 2000, pp. 21-30.

Cited by

  1. Privacy Preserving Clustering for Distributed Homogeneous Gene Expression Data Sets : vol.1, pp.3, 2010, https://doi.org/10.4018/jcmam.2010070102
  2. An Immersive Augmented-Reality-Based e-Learning System Based on Dynamic Threshold Marker Method vol.35, pp.6, 2010, https://doi.org/10.4218/etrij.13.2013.0081