Abstract
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data mining-based terrorist analysis systems. We propose a sparsified Singular Value Decomposition (SVD) method for data distortion. We also put forth a few metrics to measure the difference between the distorted dataset and the original dataset. Our experimental results using synthetic and real world datasets show that the sparsified SVD method works well in preserving privacy as well as maintaining utility of the datasets.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, California, USA (2001)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD, Dallas, Texas (2000)
Deewester, S., Dumais, S., et al.: Indexing by latent semantic analysis. J. Amer. Soc. Infor. Sci. 41, 391–407 (1990)
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of PODS 2003, San Diego, CA (June 2003)
Gao, J., Zhang, J.: Sparsification strategies in latent semantic indexing. In: Proceedings of the 2003 Text Mining Workshop, San Francisco, CA, pp. 93–103 (2003)
Skillicorn, D.B.: Clusters within clusters: SVD and counterterrorism. In: Proceedings of 2003 Workshop on Data Mining for Counter Terrorism and Security, San Francisco, CA, May 3, 12 p. (2003)
Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10, 557–570 (2002)
Vapnik, V.N.: Statistical Learning Theory. John Wiley & Sons, New York (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xu, S., Zhang, J., Han, D., Wang, J. (2005). Data Distortion for Privacy Protection in a Terrorist Analysis System. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_43
Download citation
DOI: https://doi.org/10.1007/11427995_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)