Privacy Preserving Similarity Measurement

Full Text (PDF, 211KB), PP.27-34

Views: 0 Downloads: 0

Author(s)

ZHANG Guo-rong 1,*

1. Guangzhou Academy of Fine Arts, Guangzhou, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2011.04.04

Received: 5 Apr. 2011 / Revised: 6 Jun. 2011 / Accepted: 12 Jul. 2011 / Published: 15 Aug. 2011

Index Terms

Privacy Preserving, Similarity, Isometric Transformation

Abstract

Data similarity measurement is an important direction for data mining research. This paper is concentrated on the issue of protecting the underlying attribute values when sharing data for the similarity of objects measurement and proposes a simple data transformation method: Isometric-Based Transformation (IBT). IBT selects the attribute pairs and then distorts them with Isometric Transformation. In the process of transformation, the goal is to find the proper angle ranges to satisfy the least privacy preserving requirement and then randomly choose one angle in this interval. The experiment demonstrates that the method can distort attribute values, preserve privacy information and guarantee valid similarity measurement.

Cite This Paper

ZHANG Guo-rong,"Privacy Preserving Similarity Measurement", IJWMT, vol.1, no.4, pp.27-34, 2011. DOI: 10.5815/ijwmt.2011.04.04

Reference

[1] Richard A. Moore, Jr. Controlled data-swapping techniques for masking public use microdata sets. Statistical Research Division Report Series RR 96-04, U.S. Bureau of the Census, Washington, DC, 1996.

[2] S.R.M. Oliveira, O.R. Zaïane. Privacy Preserving Clustering By Data Transformation. In Proceedings of the 18th Brazilian Symposium on Databases, Manaus, Amazonas, Brazil, October 2003, pp.304-318.

[3] S.R.M. Oliveira, O.R.Zaïane. Achieving Privacy Preservation When Sharing Data For Clustering. In Proceedings of the International Workshop on Secure Data Management in a Connected World (SDM'04) in conjunction with VLDB 2004, Toronto, Canada, August, 2004

[4] K.Muralidhar, R.Parsa, R.Sarathy. A General Additive Data Perturbation Method for Database Security. Management Science, 1999, October, 45(10):1399–1415.

[5] C.L. Blake and C.J. Merz. UCI Repository of Machine Learning Databases, University of California, Irvine, Dept. of Information and Computer Sciences, 1998