CFP last date
20 May 2024
Reseach Article

SVD based Data Transformation Methods for Privacy Preserving Clustering

by M. Naga Lakshmi, K Sandhya Rani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 3
Year of Publication: 2013
Authors: M. Naga Lakshmi, K Sandhya Rani
10.5120/13473-1157

M. Naga Lakshmi, K Sandhya Rani . SVD based Data Transformation Methods for Privacy Preserving Clustering. International Journal of Computer Applications. 78, 3 ( September 2013), 39-43. DOI=10.5120/13473-1157

@article{ 10.5120/13473-1157,
author = { M. Naga Lakshmi, K Sandhya Rani },
title = { SVD based Data Transformation Methods for Privacy Preserving Clustering },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 3 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number3/13473-1157/ },
doi = { 10.5120/13473-1157 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:50:42.161642+05:30
%A M. Naga Lakshmi
%A K Sandhya Rani
%T SVD based Data Transformation Methods for Privacy Preserving Clustering
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 3
%P 39-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays privacy issues are major concern for many government and other private organizations to delve important information from large repositories of data. Privacy preserving clustering which is one of the techniques emerged to addresses the problem of extracting useful clustering patterns from distorted data without accessing the original data directly. In this paper two hybrid data transformation methods are proposed for privacy preserving clustering in centralized database environment based on Singular Value Decomposition (SVD). In hybrid method one, SVD and rotation data perturbation are used as a combination to obtain the distorted dataset. In hybrid method two, SVD and independent component analysis are used as a combination to obtain the distorted dataset. In SVD the data is analyzed in different perspectives to retain important information. Higher order statistics which contains more important information is utilized in independent component analysis. Experimental results demonstrate that the proposed methods are efficiently protects the private data of individuals and retains the important information for clustering analysis.

References
  1. S. R. M. Oliveria, Data Transformation for Privacy-Preserving Data Mining, PhD thesis, University of Alberta, 2005.
  2. Clayton W, "Ethical, Legal and Social Implications of Genomic Medicine", New England Journal of Medicine, vol. 349, no. 6, pp. 562-569, 2003.
  3. A. F. Westin, Freebies and privacy: what net users think, Technical report, Opinion Research Corporation, July 1999, Available from http://www. privacyexchange. org/iss/surveys/sr990714. html
  4. E. Bernito, I Fovino, and L. Provenza, A framework for evaluating privacy preserving data mining algorithms Data Mining and Knowledge Discovery, vol. 29, no 2, pp. 439-450, 2000.
  5. S. Xu, J. Zhang, D. Han, J. Wang, Singular value decomposition based data distortion strategy for privacy protection Knowledge and Information Systems, vol. 10, no. 3, pp. 348-361,2007.
  6. H. Polat, W. Du, SVD-based collaborating filtering with privacy, In the 20th ACM Symposium on applied computing, Track on E-commerce Technologies, Santa Fe, New Mexico, USA. March 13-17, 2005.
  7. J. Wang, J. Zhan, and J. Zhang, Towards real-time performance of data value hiding for frequent data updates, In Proceedings of the IEEE International conference on Granular Computing. IEEE Computer Society, 2008, pp. 606-611.
  8. Jie W, Zhong WXu S, and Zhang J, Selective data distortion via structural partition and SSVD for privacy preservation in proceedings of International conference on Information and knowledge Engineering . pp-:114-120, CSERA press, Las Vegas, Nevada, USA, June.
  9. N. Maheswari, K. Duraiswamy, CLUST-SVD: Privacy Preserving Clustering in Singular value Decomposition World, Journal of Modeling and Simulation, Vol. 4 (2008), No. 4, pp 250-256.
  10. Guang Li,Yadong Wang A Privacy- Preserving Data Mining Method based on SingularValue Decomposition and Independent Component Analysis In proceeding of Data Science Journal,Volume9,16 February 2011.
  11. M. Kalitha, D. K. Bhattacharyya, M. Dutta (2008), Privacy Preserving Clustering-A Hybrid Approach ADCOM 2008.
  12. Guang Li, Yadong Wang, "A Privacy-Preserving Classification Method Based on Singular Value Decomposition", The International Arab Journal of Information Technology, Vol. 9, No. 6, November 2012.
  13. Hyvarinen, A, Karhunen, J, & Oja, E (2001) Independent Component Analysis, Hoboken, New Jersey, US: John Wiley & Sons Inc.
  14. Machine Learning Repository http://archive . ics. uci. edu/ml/datasets. html.
  15. Stanley R. M. Oliveria, Osmar R. Zaiane, Privacy Preserving Clustering By Data Transformation. Proceedings of the 18th Brazilian Symposium on Databases, 2003. 304-318.
  16. Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten (2009); The WEKA Data Mining Software: An Update; SIGKDD Explorations, Volume 11, Issue 1.
Index Terms

Computer Science
Information Sciences

Keywords

Singular value decomposition Independent component analysis Privacy preserving clustering