Abstract
Providing public access to unprotected digital data can pose a threat of unwanted disclosing the restricted information.
The problem of protecting such information can be divided into two main subclasses, namely, individual and group data anonymity. By group anonymity we define protecting important data patterns, distributions, and collective features which cannot be determined through analyzing individual records only.
An effective and comparatively simple way of solving group anonymity problem is doubtlessly applying wavelet transform. It’s easy-to-implement, powerful enough, and might produce acceptable results if used properly.
In the paper, we present a novel method of using wavelet transform for providing group anonymity; it is gained through redistributing wavelet approximation values, along with simultaneous fixing data mean value and leaving wavelet details unchanged (or proportionally altering them). Moreover, we provide a comprehensive example to illustrate the method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gantz, J.F., Reinsel, D.: As the Economy Contracts, the Digital Universe Expands. An IDC Multimedia White Paper (2009), http://www.emc.com/collateral/demos/microsites/idc-digital-universe/iview.htm
Mullins, I., Siadaty, M., Lyman, J., Scully, K., Garrett, C., Miller, W., Muller, R., Robson, B., Apte, C., Weiss, S., Rigoutsos, I., Platt, D., Cohen, S., Knaus, W.: Data Mining and Clinical Data Repositories: Insights from a 667,000 Patient Data Set. Computers in Biology and Medicine 36(12), 1351–1377 (2006)
Minnesota Population Center. Integrated Public Use Microdata Series International, https://international.ipums.org/international/
Health Insurance Portability and Accountability Act of 1996 (HIPAA). Public Law 104-191, 104th Congress, August 21 (1996), http://www.hipaa.org/
Patient Safety and Quality Improvement Act of 2005 (PSQIA). Federal Register 73(266) (2001)
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002. Official Journal of the European Communities L 201, 37–47 (July 31, 2002)
Chertov, O., Pilipyuk, A.: Statistical Disclosure Control Methods for Microdata. In: International Symposium on Computing, Communication and Control, pp. 338–342. IACSIT, Singapore (2009)
Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: ACM SIGMOD International Conference on Management of Data, pp. 439–450. ACM Press, Dallas (2000)
Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical Data-oriented Microaggregation for Statistical Disclosure Control. IEEE Transactions on Knowledge and Data Engineering 14(1), 189–201 (2002)
Fienberg, S., McIntyre, J.: Data Swapping: Variations on a Theme by Dalenius and Reiss. Technical Report, National Institute of Statistical Sciences (2003)
Domingo-Ferrer, J.: A Survey of Inference Control Methods for Privacy-Preserving Data Mining. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining: Models and Algorithms, pp. 53–80. Springer, New York (2008)
Xu, S., Zhang, J., Han, D., Wang, J.: Singular Value Decomposition Based Data Distortion Strategy for Privacy Protection. Knowledge and Information Systems 10(3), 383–397 (2006)
Wang, J., Zhong, W.J., Zhang, J.: NNMF-based Factorization Techniques for High-accuracy Privacy Protection on Non-negative-valued Datasets. In: IEEE Conference on Data Mining, International Workshop on Privacy Aspects of Date Mining, pp. 513–517. IEEE Computer Society, Washington (2006)
Liu, L., Wang, J., Lin, Z., Zhang, J.: Wavelet-Based Data Distortion for Privacy-Preserving Collaborative Analysis. Technical Report No. 482-07, Department of Computer Science, University of Kentucky, Lexington (2007)
Davydov, A.: Wavelet-analysis of the Social Processes. Sotsiologicheskie issledovaniya 11, 89–101 (2003) (in Russian), http://www.ecsocman.edu.ru/images/pubs/2007/10/30/0000315095/012.DAVYDOV.pdf
The Free Haven Project, http://freehaven.net/anonbib/full/date.html
Evfimievski, A.: Randomization in Privacy Preserving Data Mining. ACM SIGKDD Explorations Newsletter 4(2), 43–48 (2002)
Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: Random-data Perturbation Techniques and Privacy-preserving Data Mining. Knowledge and Information Systems 7(4), 387–414 (2005)
Aggarwal, C.C.: On Randomization, Public Information and the Curse of Dimensionality. In: 23rd International Conference on Data Enginering, pp. 136–145. IEEE Computer Society, Washington (2007)
Sweeney, L.: k-anonymity: a Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)
Mallat, S.: A Wavelet Tour of Signal Processing. Academic Press, New York (1999)
Strang, G., Nguyen, T.: Wavelet and Filter Banks. Wellesley-Cambridge Press, Wellesley (1997)
Li, T., Li, Q., Zhu, S., Ogihara, M.: A Survey on Wavelet Applications in Data Mining. ACM SIGKDD Explorations Newsletter 4(2), 49–68 (2002)
Bapna, S., Gangopadhyay, A.: A Wavelet-based Approach to Preserve Privacy for Classification Mining. Decision Sciences Journal 37(4), 623–642 (2006)
Liu, L., Wang, J., Zhang, J.: Wavelet-based Data Perturbation for Simultaneous Privacy-Preserving and Statistics-Preserving. In: 2008 IEEE International Conference on Data Mining Workshops, pp. 27–35. IEEE Computer Society, Washington (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chertov, O., Tavrov, D. (2012). Providing Group Anonymity Using Wavelet Transform. In: MacKinnon, L.M. (eds) Data Security and Security Data. BNCOD 2010. Lecture Notes in Computer Science, vol 6121. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25704-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-25704-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25703-2
Online ISBN: 978-3-642-25704-9
eBook Packages: Computer ScienceComputer Science (R0)