메뉴 건너뛰기




Volumn 83, Issue , 2013, Pages 93-110

Breaching Euclidean distance-preserving data perturbation using few known inputs

Author keywords

Data mining; Data perturbation; Euclidean distance; Privacy

Indexed keywords

DATA MINING ALGORITHM; DATA PERTURBATION; DATA SETS; DATA TUPLES; ESTIMATION RESULTS; EUCLIDEAN; EUCLIDEAN DISTANCE; K-MEANS CLUSTERING; NUMBER OF DATUM; PRIVACY BREACHES; PRIVACY PRESERVING DATA MINING;

EID: 84871925104     PISSN: 0169023X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.datak.2012.10.004     Document Type: Article
Times cited : (20)

References (43)
  • 2
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar On the privacy preserving properties of random data perturbation techniques Proc. IEEE ICDM 2003
    • (2003) Proc. IEEE ICDM
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 3
    • 29844458622 scopus 로고    scopus 로고
    • Deriving private information from randomized data
    • Z. Huang, W. Du, and B. Chen Deriving private information from randomized data Proc. ACM SIGMOD 2005 37 48
    • (2005) Proc. ACM SIGMOD , pp. 37-48
    • Huang, Z.1    Du, W.2    Chen, B.3
  • 4
    • 56749173528 scopus 로고    scopus 로고
    • Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining
    • S. Guo, X. Wu, and Y. Li Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining Knowledge and Information Systems 17 2 2008 217 240
    • (2008) Knowledge and Information Systems , vol.17 , Issue.2 , pp. 217-240
    • Guo, S.1    Wu, X.2    Li, Y.3
  • 6
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N.R. Adam, and J.C. Worthmann Security-control methods for statistical databases: a comparative study ACM Computing Surveys 21 4 1989 515 556
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.C.2
  • 7
    • 33750283449 scopus 로고    scopus 로고
    • Privacy preserving data classification with rotation perturbation
    • K. Chen, and L. Liu Privacy preserving data classification with rotation perturbation Proc. IEEE ICDM 2005 589 592
    • (2005) Proc. IEEE ICDM , pp. 589-592
    • Chen, K.1    Liu, L.2
  • 10
    • 33750293582 scopus 로고    scopus 로고
    • An attacker's view of distance preserving maps for privacy preserving data mining
    • K. Liu, C. Giannella, and H. Kargupta An attacker's view of distance preserving maps for privacy preserving data mining Proc. PKDD 2006 297 308
    • (2006) Proc. PKDD , pp. 297-308
    • Liu, K.1    Giannella, C.2    Kargupta, H.3
  • 11
    • 36048948044 scopus 로고    scopus 로고
    • A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms
    • S. Mukherjee, Z. Chen, and A. Gangopadhyay A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms The VLDB Journal 15 4 2006 293 315
    • (2006) The VLDB Journal , vol.15 , Issue.4 , pp. 293-315
    • Mukherjee, S.1    Chen, Z.2    Gangopadhyay, A.3
  • 12
    • 49049097752 scopus 로고    scopus 로고
    • Towards attack-resilient geometric data perturbation
    • K. Chen, G. Sun, and L. Liu Towards attack-resilient geometric data perturbation Proc. SIAM SDM 2007
    • (2007) Proc. SIAM SDM
    • Chen, K.1    Sun, G.2    Liu, L.3
  • 16
    • 45249117455 scopus 로고    scopus 로고
    • A privacy preserving technique for distance-based classification with worst case privacy guarantees
    • S. Mukherjee, M. Banerjee, Z. Chen, and A. Gangopadhyay A privacy preserving technique for distance-based classification with worst case privacy guarantees Data & Knowledge Engineering 66 2 2008 264 288
    • (2008) Data & Knowledge Engineering , vol.66 , Issue.2 , pp. 264-288
    • Mukherjee, S.1    Banerjee, M.2    Chen, Z.3    Gangopadhyay, A.4
  • 18
    • 24944474471 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • A. Evfimevski, J. Gehrke, and R. Srikant Limiting privacy breaches in privacy preserving data mining Proc. ACM PODS 2003
    • (2003) Proc. ACM PODS
    • Evfimevski, A.1    Gehrke, J.2    Srikant, R.3
  • 19
    • 39749182452 scopus 로고    scopus 로고
    • The applicability of the perturbation based privacy preserving data mining for real-world data
    • L. Liu, M. Kantarcioglu, and B. Thuraisingham The applicability of the perturbation based privacy preserving data mining for real-world data Data & Knowledge Engineering 65 1 2008 5 21
    • (2008) Data & Knowledge Engineering , vol.65 , Issue.1 , pp. 5-21
    • Liu, L.1    Kantarcioglu, M.2    Thuraisingham, B.3
  • 20
    • 55149108163 scopus 로고    scopus 로고
    • Multiplicative noise for masking continuous data
    • Statistical Research Division, U.S. Bureau of the Census Washington D.C. (April)
    • J.J. Kim, and W.E. Winkler Multiplicative noise for masking continuous data Tech. Rep. Statistics #2003-01 2003 Statistical Research Division, U.S. Bureau of the Census Washington D.C. (April)
    • (2003) Tech. Rep. Statistics #2003-01
    • Kim, J.J.1    Winkler, W.E.2
  • 26
    • 57149136993 scopus 로고    scopus 로고
    • Privacy-preserving data mining: Models and algorithms
    • 1st edition Springer (Ch. 5)
    • C.C. Aggarwal, and P.S. Yu Privacy-preserving data mining: models and algorithms Advances in Database Systems 1st edition 2008 Springer (Ch. 5)
    • (2008) Advances in Database Systems
    • Aggarwal, C.C.1    Yu, P.S.2
  • 27
    • 35048841248 scopus 로고    scopus 로고
    • A condensation based approach to privacy preserving data mining
    • C.C. Aggarwal, and P.S. Yu A condensation based approach to privacy preserving data mining Proc. EDBT 2004 183 199
    • (2004) Proc. EDBT , pp. 183-199
    • Aggarwal, C.C.1    Yu, P.S.2
  • 28
    • 33746873290 scopus 로고    scopus 로고
    • A tree-based data perturbation approach for privacy-preserving data mining
    • X.-B. Li, and S. Sarkar A tree-based data perturbation approach for privacy-preserving data mining IEEE Transactions on Knowledge and Data Engineering 18 9 2006 1278 1283
    • (2006) IEEE Transactions on Knowledge and Data Engineering , vol.18 , Issue.9 , pp. 1278-1283
    • Li, X.-B.1    Sarkar, S.2
  • 30
    • 33646367179 scopus 로고    scopus 로고
    • Data shuffling - A new masking approach for numeric data
    • K. Muralidhar, and R. Sarathy Data shuffling - a new masking approach for numeric data Management Science 52 5 2006 658 670
    • (2006) Management Science , vol.52 , Issue.5 , pp. 658-670
    • Muralidhar, K.1    Sarathy, R.2
  • 31
    • 1142294784 scopus 로고    scopus 로고
    • Maintaining data privacy in association rule mining
    • S.J. Rizvi, and J.R. Haritsa Maintaining data privacy in association rule mining Proc. VLDB 2002
    • (2002) Proc. VLDB
    • Rizvi, S.J.1    Haritsa, J.R.2
  • 34
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • (14:1-14:53)
    • B. Fung, K. Wang, R. Chen, and P. Yu Privacy-preserving data publishing: a survey of recent developments ACM Computing Surveys 42 4 2010 (14:1-14:53)
    • (2010) ACM Computing Surveys , vol.42 , Issue.4
    • Fung, B.1    Wang, K.2    Chen, R.3    Yu, P.4
  • 36
    • 0042826822 scopus 로고    scopus 로고
    • Independent component analysis: Algorithms and applications
    • A. Hyvärinen, and E. Oja Independent component analysis: algorithms and applications Neural Networks 13 4 2000 411 430
    • (2000) Neural Networks , vol.13 , Issue.4 , pp. 411-430
    • Hyvärinen, A.1    Oja, E.2
  • 37
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • K. Liu, H. Kargupta, and J. Ryan Random projection-based multiplicative data perturbation for privacy preserving distributed data mining IEEE Transactions on Knowledge and Data Engineering 18 1 2006 92 106
    • (2006) IEEE Transactions on Knowledge and Data Engineering , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 38
    • 38049109087 scopus 로고    scopus 로고
    • Deriving private information from arbitrarily projected data
    • S. Guo, and X. Wu Deriving private information from arbitrarily projected data Proc. PAKDD 2007
    • (2007) Proc. PAKDD
    • Guo, S.1    Wu, X.2
  • 39
  • 40
    • 0003449348 scopus 로고
    • 3rd ed. Harcourt Brace Jovanovich College Publishers New York
    • G. Strang Linear Algebra and Its Applications 3rd ed. 1986 Harcourt Brace Jovanovich College Publishers New York
    • (1986) Linear Algebra and Its Applications
    • Strang, G.1
  • 41
    • 0001189848 scopus 로고
    • Algorithm as 127: Generation of random orthogonal matrices
    • R. Heiberger Algorithm as 127: generation of random orthogonal matrices Applied Statistics 27 2 1978 199 206
    • (1978) Applied Statistics , vol.27 , Issue.2 , pp. 199-206
    • Heiberger, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.