Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.4.53

An Analysis of Privacy and Accuracy for Privacy-Preserving Techniques by Matrix-based Randomization  

Kang, Ju-Sung (Kookmin University)
An, A-Ron (Kookmin University)
Hong, Do-Won (Electronics and Telecommunications Research Institute)
Abstract
We study on the practical privacy-preserving techniques by matrix-based randomization approach. We clearly examine the relationship between the two parameters associated with the measure of privacy breach and the condition number of matrix in order to achieve the optimal transition matrix. We propose a simple formula for efficiently calculating the inverse of transition matrix which are needed in the re-construction process of random substitution algorithm, and deduce some useful connections among standard error and another parameters by obtaining condition numbers according to norms of matrix and the expectation and variance of the transformed data. Moreover we give some experimental results about our theoretical expressions by implementing random substitution algorithm.
Keywords
privacy-preserving techniques; matrix-based randomization; privacy breach; condition number;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Kun Liu, Hillol Kargupta, and Jessica Ryan, 'Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining', IEEE Transactions on Knowledge and Data Engineering archive, Vol. 18, Issue 1, 2006
2 A. Evfimievski, J. Gehrke, and R. Srikant, 'Limiting Privacy Breaches in Privacy Preserving Data Mining', Proc. of ACM Symp. on Principles of Database Systems (PODS), 2003
3 D. Agrawal, C. C. Agrawal, 'On the design and quantification of privacy preserving data mining algorithms', Proceedings of the 20th Symposium on Principles of Database Systems, May 2001
4 Jim Dowd, Shouhuai Xu, and Weining Zhang, 'Privacy-Preserving Decision Tree Mining Based on Random Substitutions', ETRICS2006, LNCS 3995, Springer-Verlag, pp. 145-159, 2006
5 S. Agrawal, and J. Haritsa, 'A Framework for High-Accuracy Privacy-Preserving Mining', Proc. of ICDE 2005, 2005
6 S. Agrawal, and J. Haritsa, 'A framework for high-accuracy privacy-preserving mining', Technical Report TR-2004-02, Database Systems Lab, Indian Institute of Science, 2004. (http://dsl.serc.iisc.ermet.in/pub/TR/R-2004-02.pdf)
7 Y. Wang, 'On the number of success in independent trials', Statistica Silica 3, 1993
8 R. Agrawal, R. Srikant, 'Privacy preserving data mining', ACM SIGMOD Conference on Management of Data, Dallas, TX, 2000, pp. 439-450
9 C. D. Meyer, Matrix Analysis and Applied Linear Algebra, SIAM(Society for Industrial and Applied Mathematics), Philadelphia, 2000
10 Keke Chen, and Ling Liu, 'Privacy-Preserving Data Classification with Rotation Perturbation', Proc. of IEEE Intl. Conf. on Data Mining (ICDM05), 2005