期刊文献+

面向聚类挖掘的局部旋转扰动隐私保护算法 被引量:7

Partial Rotation Perturbation for Privacy-Preserving Clustering Mining
下载PDF
导出
摘要 聚类挖掘可以高效准确地从数据中找出很多潜在的、有价值的规律,但也同时存在着泄露用户隐私数据的安全威胁.已经有一些专门针对聚类挖掘的隐私保护研究,其中乘法扰动方法是一种准确性和安全性都较高的隐私保护算法.研究发现已知信息独立分量分析极大地降低了已有乘法扰动方法的安全性,它能够从乘法扰动数据中近似估计隐私数据.为了解决以上问题,提出了局部旋转扰动隐私保护算法,通过准确性分析得出新算法具有零损失准确性.利用安全性分析证明新算法能够有效抵御独立分量分析的攻击,具有更高的安全性.将新算法应用到聚类挖掘中,得到了与未加隐私保护的聚类挖掘非常接近的结果,说明了它的可行性.局部旋转扰动方法的出现,有效地解决了已有乘法扰动方法的安全漏洞,使得聚类挖掘能够更加安全地得到应用. Many potential and valuable rules can be derived from data via clustering mining in an effective and accurate way, which can lead to security threats such as the disclosure of user privacy. Many privacy-preserving researches on clustering mining have been conducted, especially on muhiplicative perturbation (MP) that is a highly secure and accurate method. Research finds known knowledge independ- ent component analysis (KK-ICA) can greatly reduce the privacy security of existing MP. It can approximately estimate private data from MP data. To solve the problem, partial rotation perturbation (PRP) is proposed. The analysis of accuracy shows that PRP has zero-loss accuracy. The analysis of security proves that PRP can defend attack from the KK-ICA availably and is more secure. PRP is applied in clustering mining. The results are very similar to unpreserved clustering mining results, which shows that MP is practicable. The existence of PRP solves the problem with the security vulnerability of existing MP effectively, making the application of clustering more secure.
出处 《广东工业大学学报》 CAS 2012年第3期28-34,45,共8页 Journal of Guangdong University of Technology
基金 国家自然科学基金资助项目(70971027)
关键词 聚类挖掘 隐私保护 乘法扰动 局部旋转扰动 clustering mining privacy-preserving muhiplicative perturbation partial rotation perturbation
  • 相关文献

参考文献14

  • 1Agrawal R, Srikant R. Privacy-preserving data mining [C ]. Proceedings of the ACM SIGMOD Conference on Management of Data, Dallas, TX USA: ACM SIGMOD, 2000 : 439-450.
  • 2Agrawal D, Aggarwal C C. On the design and quantifica- tion of privacy preserving data mining algorithms[ C]. Pro- ceedings of the 20th ACM SIGMOD-SIGACT-SIGART Sym- posium on Principles of Database Systems, Santa Barbara, California, May 2001 : 247-255.
  • 3Evfimevski A, Gehrke J, Srikant R. Limiting privacy brea- ches in privacy preserving data mining[ C ]. Proceedings of the ACM SIGMOD/PODS Conference San Diego, CA, June 2003.
  • 4Warner S L. Randomized Response : A survey technique for eliminating evasive answer bias [ J ]. Journal of the Ameri- can Statistical Association, 1965, 60: 63-69.
  • 5Chen K, Liu L. A random rotation perturbation approach to privacy preserving data classification [ D ]. USA : Georgia Institute of Technology, 2005.
  • 6Liu K, Kargupta H, Ryan J. Random projection-based multiplicative data perturbation for privacy preserving dis- tributed data mining [ J ]. Knowledge and Data Engineer- ing, IEEE Transactions on,2006,18( 1 ) : 92-106.
  • 7Aapo Hyvtrinen, Jarmo Hurri, Patrik O Hoyer. Independ- ent Component Analysis [ M ]. Computational Imaging and Vision, Springer London, 2009, 39 : 151-175.
  • 8李广彪,张剑云,毛云祥.盲源分离的发展及研究现状[J].航天电子对抗,2004,33(6):13-16. 被引量:5
  • 9Guo S, Wu X. Deriving private information from arbitrarily projected data [ J ]. Advances in Knowledge Discovery and Data Mining, 2007: 84-95.
  • 10Kargupta H, Datta S, Wang Q, et al. On the privacy pre- serving properties of random data perturbation techniques [ C ]. Proceedings of the 3rd IEEE International Confer- ence on Data Mining, Melbourne, FL, USA, November 2003.

二级参考文献17

  • 1张贤达,保铮.盲信号分离[J].电子学报,2001,29(z1):1766-1771. 被引量:210
  • 2Parra L,Spence C. Convolutive blind source separation of nonstationary sources[J]. IEEE Trans. On Speech Audio Processing, 2000(10) :320~327.
  • 3Jutten C, Herault J. Space or time adaptive signal processing by neural network models [C]. In Intern.Conf. On Neural Networks for Computing. Snowbird(Utah, USA) ,1986:206~211.
  • 4Jutten C, Herault J. Blind separation of sources, Part Ⅰ: An adaptive algorithm based on neuromimetic architecture[J]. Signal Processing,1991,24(1) :1~10.
  • 5Common P, Jutten C, Herault J. Blind separation of sources, Part Ⅱ: Problems statement [J]. Signal Processing,1991,24(1) :11~20.
  • 6Sorouchyari E. Blind separation of sources, Part Ⅲ:stability analysis[J]. Signal Processing. 1991,24(1):21~30.
  • 7Common P. Independent component analysis, a new concept? [J]. Signal Processing, 1994, 36 (3): 287 ~314.
  • 8L Tong, R Liu, Soon VC, et al. Indeterminacy and Identifiability of Blind Identification[J]. IEEE Trans.On Circuits and Systems,1991,38(5):499~509.
  • 9Kiyotoshi Matsuoka, Masahiro Ohya and Mitsuru Kawamoto. A Neural Net for Blind Separation of Nonstationary Signals[J]. Neural Networks, 1995,8(3):411~419.
  • 10Kawamoto M, Barros AK, Mansour A, et al. Real World Blind Separation of Convolved Non-stationary Signals[C]. Proc. International Workshop on Independent Component Analysis and Signal Separation ICA'99, Aussois, France, 1999:347~ 352.

共引文献4

同被引文献62

  • 1宋明,刘宗田.基于数据交叠分区的并行DBSCAN算法[J].计算机应用研究,2004,21(7):17-20. 被引量:9
  • 2何中胜,刘宗田,庄燕滨.基于数据分区的并行DBSCAN算法[J].小型微型计算机系统,2006,27(1):114-116. 被引量:16
  • 3贺玲,吴玲达,蔡益朝.数据挖掘中的聚类算法综述[J].计算机应用研究,2007,24(1):10-13. 被引量:222
  • 4SOMAN K P.数据挖掘基础教程[M].范明,牛常勇,译.北京:机械工业出版社,2009.
  • 5申卯兴,许进.求解线性规划的单纯形法的直接方法[J].计算机工程与应用,2007,43(30):94-96. 被引量:19
  • 6郗洋.基于云计算的并行聚类算法研究[D].南京:南京邮电大学,2012.
  • 7Goldreich O. Foundations of Cryptography : Volume 2, Bas- ic Applications [ M ]. Cambridge:England Cambridge uni- versity press,2009:332410.
  • 8Yao A C. Protocols for secure computations [ C ]//M Tho- rup :2013 IEEE 54th Annual Symposium on Foundations of Computer Science. Berkeley : IEEE Computer Society, 1982 : 160-164.
  • 9Goldreich O, Micali S, Wigderson A. How to play any men- tal game [ C ]// Alfred V A : Proceedings of the nineteenth annual ACM symposium on Theory of computing. New York :ACM, 1987:218-229.
  • 10Du W, Atallah M J. Privacy-preserving cooperative scientif- ic computations [ C ]//Smith G: Proceedings of the 14th IEEE Computer Security Foundations Workshop. Nova Sco- tia : IEEE Computer Society, 2001 : 0273-0273.

引证文献7

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部