Skip to main content

Abstract

Today, privacy preservation is one of the greater concerns in data mining. While the research to develop different techniques for data preservation is on, a concrete solution is awaited. We address the privacy issue in data mining by a novel privacy preserving data mining technique. We develop and introduce a novel ICT (inverse cosine based transformation) method to preserve the data before subjecting it to clustering or any kind of analysis. A novel ‘privacy preserved k-clustering algorithm’ (PrivClust) is developed by embedding our ICT method into existing K-means clustering algorithm. This algorithm is explicitly designed with conversion to a privacy-preserving version in mind. The challenge was how to meet privacy requirements and guarantee valid clustering results as well. Simulation was carried out using Matlab. Our analysis and simulation show that this algorithm efficiently preserves the intended information on the one hand and yields valid cluster results on the other.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aggarwal, C.C., and Yu P.S.: Privacy Preserving data mining, Springer (2008)

    Google Scholar 

  2. Clifton C., Kantarcioglu M., Vaidya J.: Defining Privacy for Data Mining. Purdue University, West Lafayette.

    Google Scholar 

  3. Elmasri, N., Gupta S.: Fundamentals of Database Systems, Pearson Education, Inc, First Impression, (2006)

    Google Scholar 

  4. Evfimievski, A.: Randomization in Privacy-Preserving Data Mining. In SIGKDD Explorations, 4(2): 43–48, December (2002)

    Article  Google Scholar 

  5. Hann, J., Kamber M.: Data Mining concepts and techniques, Elsevier, 2ed. (2006)

    Google Scholar 

  6. Jagannathan, G., Pillaipakkamnatt, K., Wright, R.N.: A New Privacy-Preserving Distributed k-Clustering Algorithm in proceedings of 2006 SIAM international conference on data mining on SDM-(2006)

    Google Scholar 

  7. Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining, Advances in Cryptology—Crypto’ 00 Proceedings, LNCS 1880, Springer-Verlag, pp. 20–24, August 2000. A full version appeared in the Journal of Cryptology, Volume 15-Number 3, (2002)

    Google Scholar 

  8. Oliveira, S. R. M., Zaïane, O. R.: Privacy Preserving Clustering By Data Transformation. In Proceedings of the 18th Brazilian Symposium on Databases, Manaus, Amazonas, Brazil, October (2003), pp. 304–318.

    Google Scholar 

  9. Oliveira, S. R. M., Zaïane, O. R.: Achieving Privacy Preservation When Sharing Data for Clustering. In Proceedings of the International Workshop on Secure Data Management in a Connected World (SDM’04) in conjunction with VLDB (2004), Toronto, Canada, August, (2004)

    Google Scholar 

  10. Pinkas, B.: Cryptographic Techniques for Privacy-Preserving Data Mining SIGKDD Explorations, the newsletter of the ACM Special Interest Group on Knowledge Discovery and Data Mining, January (2003)

    Google Scholar 

  11. Sweeny, L.: Achieving k-anonymity privacy protection using generalization and suppression. (2002) CMU.

    Google Scholar 

  12. Upadhyay, A.K., Gupta R., Kumar R.: Analytical model for revised K-clustering algorithm for privacy preservation in data mining. RACE (2007) at BEC Bikaner, IEEE sponsored international conference.

    Google Scholar 

  13. Vaidya, J., Clifton, C.: Privacy-Preserving K-Means Clustering over Vertically Partitioned Data. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August (2003) pp. 206–215.

    Google Scholar 

  14. Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining in proceedings of (2000) ACM SIGMOD Conference on Management of Data, pages 439–450, Dallas, TX, May 14–19 (2000). ACM.

    Google Scholar 

  15. Adam, N. R., Wortmann, J. C.: Security-Control Methods for Statistical Databases. ACM Computing Surveys, 21(4):515–556, Dec. (1989)

    Article  Google Scholar 

  16. Murlidhar, K., Parsa, R., Sarathy, R.: A General Additive Data Perturbation Method for Database Security. Management Science, 45(10): 1399–1415, October (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Indian Institute of Information Technology, India

About this paper

Cite this paper

Upadhayay, A.K., Agarwal, A., Masand, R., Gupta, R. (2009). Privacy Preserving Data Mining: A New Methodology for Data Transformation. In: Tiwary, U.S., Siddiqui, T.J., Radhakrishna, M., Tiwari, M.D. (eds) Proceedings of the First International Conference on Intelligent Human Computer Interaction. Springer, New Delhi. https://doi.org/10.1007/978-81-8489-203-1_36

Download citation

  • DOI: https://doi.org/10.1007/978-81-8489-203-1_36

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-8489-404-2

  • Online ISBN: 978-81-8489-203-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics