Reference Hub3
A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining

A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining

Mohammad Reza Keyvanpour, Somayyeh Seifi Moradi
Copyright: © 2014 |Volume: 10 |Issue: 1 |Pages: 22
ISSN: 1548-3924|EISSN: 1548-3932|EISBN13: 9781466653757|DOI: 10.4018/ijdwm.2014010104
Cite Article Cite Article

MLA

Keyvanpour, Mohammad Reza, and Somayyeh Seifi Moradi. "A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining." IJDWM vol.10, no.1 2014: pp.55-76. http://doi.org/10.4018/ijdwm.2014010104

APA

Keyvanpour, M. R. & Moradi, S. S. (2014). A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining. International Journal of Data Warehousing and Mining (IJDWM), 10(1), 55-76. http://doi.org/10.4018/ijdwm.2014010104

Chicago

Keyvanpour, Mohammad Reza, and Somayyeh Seifi Moradi. "A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining," International Journal of Data Warehousing and Mining (IJDWM) 10, no.1: 55-76. http://doi.org/10.4018/ijdwm.2014010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this study, a new model is provided for customized privacy in privacy preserving data mining in which the data owners define different levels for privacy for different features. Additionally, in order to improve perturbation methods, a method combined of singular value decomposition (SVD) and feature selection methods is defined so as to benefit from the advantages of both domains. Also, to assess the amount of distortion created by the proposed perturbation method, new distortion criteria are defined in which the amount of created distortion in the process of feature selection is considered based on the value of privacy in each feature. Different tests and results analysis show that offered method based on this model compared to previous approaches, caused the improved privacy, accuracy of mining results and efficiency of privacy preserving data mining systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.