Skip to main content

Privacy Preserving Technique for Euclidean Distance Based Mining Algorithms Using a Wavelet Related Transform

  • Conference paper
  • 1647 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6283))

Abstract

Privacy preserving data mining is an art of knowledge discovery without revealing the sensitive data of the data set. In this paper a data transformation technique using wavelets is presented for privacy preserving data mining. Wavelets use well known energy compaction approach during data transformation and only the high energy coefficients are published to the public domain instead of the actual data proper. It is found that the transformed data preserves the Eucleadian distances and the method can be used in privacy preserving clustering. Wavelets offer the inherent improved time complexity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proc. SIGMOD, pp. 439–450 (2000)

    Google Scholar 

  2. Aggarwal, C.C., Yu, P.S.: Privacy preserving Data Mining: Models and Algorithms. Springer, Heidelberg (2008)

    Book  Google Scholar 

  3. Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving svm using nonlinear kernels on horizontally partitioned data. In: SAC ’06: Proceedings of the 2006 ACM Symposium on Applied Computing, New York, NY, USA, pp. 603–610 (2006)

    Google Scholar 

  4. Vaidya., J., Clifton, C.: Privacy preserving naive Bayes classifier for vertically partitioned data. In: Proc. of SIAM International Conference on Data Mining (ICDM’04), Lake Buena Vista, Florida, pp. 522–526 (April 2004)

    Google Scholar 

  5. Wang, J., Luo, Y., Zhao, Y., Le, J.: A survey on privacy preserving data mining. In: Proc. of First International Workshop on Database Technology and Applications, Impact on Knowledge Discovery in Databases. Journal of Database Management, vol. 14(2), pp. 14–26 (2003)

    Google Scholar 

  6. Soman, K.P., Ramachandran, K.I.: Insight into wavelets from theory to practice, 2nd edn. Prentice Hall, India (2005)

    Google Scholar 

  7. L., Liu, L., Wang, J., Zhang, J.: Wavelet based data perturbation for simultaneous privacy preserving and statistics preserving. In: Proc. of IEEE International Conference on Data Mining Workshops (2008)

    Google Scholar 

  8. Wang, J., Zhong, W., Zhang, J.: NNMF-Based factorization techniques for high accuracy privacy protection on non-negative valued datasets. In: Proc. of Sixth IEEE International Conference on Data Mining Workshops, ICDM 2006 (2006)

    Google Scholar 

  9. Mukharjee, S., Banarjee, M., Chen, Z., Gangopadhyay, A.: A privacy preserving technique for distance based classification with worst case privacy guarantees. Data and Knowledge Engineering 66, 264–288 (2008)

    Article  Google Scholar 

  10. Xu, S., Lai, S.: Fast Fourier transform based data perturbation method for privacy protection. In: Proc. of Intelligence and Security Informatics (2007)

    Google Scholar 

  11. Li, T., Li, Q., Zhu, S., Ogihara, M.: A survey on wavelet applications in data mining. SIGKDD Explorations 4(2), 49–68 (2002)

    Article  Google Scholar 

  12. Li, X., Li, H., Wang, F., Ding, J.: A remark on Mallats pyramidal algorithm of wavelet analysis. Communications in Nonlinear Science & Numerical Simulation 2(4) (December 1997)

    Google Scholar 

  13. Young, R.: Wavelet theory and applications. Kluwer academic publishers, Boston (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kadampur, M.A., D.V.L.N., S. (2010). Privacy Preserving Technique for Euclidean Distance Based Mining Algorithms Using a Wavelet Related Transform. In: Fyfe, C., Tino, P., Charles, D., Garcia-Osorio, C., Yin, H. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2010. IDEAL 2010. Lecture Notes in Computer Science, vol 6283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15381-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15381-5_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15380-8

  • Online ISBN: 978-3-642-15381-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics