Skip to main content
Erschienen in: Wireless Personal Communications 2/2018

05.01.2018

A New Privacy-Preserving Data Mining Method Using Non-negative Matrix Factorization and Singular Value Decomposition

verfasst von: Guang Li, Rui Xue

Erschienen in: Wireless Personal Communications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The data analysis and mining is more and more powerful with the rapid growing data size. And publishing data for researchers is becoming more valuable. This process has an important problem: privacy protection. In recent decades, many methods for protecting privacy in data publishing have been studied. One important kind of them is based on matrix decompositions. These methods find non-critical information for analysis task using matrix decompositions and remove it from the data to protecting privacy. This paper improves this kind method and gives a new algorithm for protecting privacy based on non-negative matrix factorization and singular value decomposition. Our basic idea is that if using plurality kinds of decompositions, it can analyze data from different directions and will analyze data more comprehensive. So, it may find more non-critical information and improve the algorithm performance. The experiments confirmed this idea. This new method can get better result than the traditional ones in which only one kind decomposition is used. Our method gives more powerful guarantee for protecting privacy when maintaining data quality.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Peng, J., Lu, J., Shang, X., & Chen, J. (2017). Identifying consistent disease subnetworks using DNet. Methods, 131, 104–110.CrossRef Peng, J., Lu, J., Shang, X., & Chen, J. (2017). Identifying consistent disease subnetworks using DNet. Methods, 131, 104–110.CrossRef
2.
Zurück zum Zitat Peng, J., Xue, H., Shao, Y., Shang, X., Wang, Y., & Chen, J. (2017). A novel method to measure the semantic similarity of HPO terms. International Journal of Data Mining and Bioinformatics, 17(2), 173–188.CrossRef Peng, J., Xue, H., Shao, Y., Shang, X., Wang, Y., & Chen, J. (2017). A novel method to measure the semantic similarity of HPO terms. International Journal of Data Mining and Bioinformatics, 17(2), 173–188.CrossRef
3.
Zurück zum Zitat Hall, M. A., & Rich, S. S. (2000). Patients’ fear of genetic discrimination by health insurers: The impact of legal protections. Genetics in Medicine, 2(4), 214–221.CrossRef Hall, M. A., & Rich, S. S. (2000). Patients’ fear of genetic discrimination by health insurers: The impact of legal protections. Genetics in Medicine, 2(4), 214–221.CrossRef
4.
Zurück zum Zitat Clayton, E. (2003). Ethical, legal, and social implications of genomic medicine. New England Journal of Medicine, 349(6), 562–569.CrossRef Clayton, E. (2003). Ethical, legal, and social implications of genomic medicine. New England Journal of Medicine, 349(6), 562–569.CrossRef
5.
Zurück zum Zitat Vaghashia, H., & Ganatra, A. (2015). A survey: Privacy preservation techniques in data mining. International Journal of Computer Applications, 119(4), 20–26.CrossRef Vaghashia, H., & Ganatra, A. (2015). A survey: Privacy preservation techniques in data mining. International Journal of Computer Applications, 119(4), 20–26.CrossRef
6.
Zurück zum Zitat Yun, U., & Kim, J. (2015). A fast perturbation algorithm using tree structure for privacy preserving utility mining. Expert Systems with Applications, 42(3), 1149–1165.CrossRef Yun, U., & Kim, J. (2015). A fast perturbation algorithm using tree structure for privacy preserving utility mining. Expert Systems with Applications, 42(3), 1149–1165.CrossRef
7.
Zurück zum Zitat Xu, S., Zhang, J., Han, D., & Wang, J. (2006). Singular value decomposition based data distortion strategy for privacy protection. Knowledge and Information Systems, 10(3), 383–397.CrossRef Xu, S., Zhang, J., Han, D., & Wang, J. (2006). Singular value decomposition based data distortion strategy for privacy protection. Knowledge and Information Systems, 10(3), 383–397.CrossRef
8.
Zurück zum Zitat Wang, J., Zhang, J., Xu, S., & Zhong, W. (2008). A novel data distortion approach via selective SSVD for privacy protection. International Journal of Information and Computer Security, 2(1), 48–70.CrossRef Wang, J., Zhang, J., Xu, S., & Zhong, W. (2008). A novel data distortion approach via selective SSVD for privacy protection. International Journal of Information and Computer Security, 2(1), 48–70.CrossRef
9.
Zurück zum Zitat Wang, J., Zhong, W., & Zhang, J. (2006). NNMF-based factorization techniques for high-accuracy privacy protection on non-negative-valued datasets. In Proceedings of the sixth IEEE international conference on data mining—workshops (pp. 513–517). Wang, J., Zhong, W., & Zhang, J. (2006). NNMF-based factorization techniques for high-accuracy privacy protection on non-negative-valued datasets. In Proceedings of the sixth IEEE international conference on data mining—workshops (pp. 513–517).
10.
Zurück zum Zitat Li, G., & Xi, M. (2015). An improved algorithm for privacy-preserving data mining based on NMF. Journal of Information and Computational Science, 12(9), 3423–3430.CrossRef Li, G., & Xi, M. (2015). An improved algorithm for privacy-preserving data mining based on NMF. Journal of Information and Computational Science, 12(9), 3423–3430.CrossRef
11.
Zurück zum Zitat Liu, L., Wang, J., & Zhang, J. (2008). Wavelet-based data perturbation for simultaneous privacy-preserving and statistics-preserving. In Proceedings of the 2008 IEEE international conference on data mining workshops (pp. 27–35). Liu, L., Wang, J., & Zhang, J. (2008). Wavelet-based data perturbation for simultaneous privacy-preserving and statistics-preserving. In Proceedings of the 2008 IEEE international conference on data mining workshops (pp. 27–35).
12.
Zurück zum Zitat Zhang, X., Xu, Z., Jia, N., Yang, W., Feng, Q., Chen, W., et al. (2015). Denoising of 3D magnetic resonance images by using higher-order singular value decomposition. Medical Image Analysis, 19(1), 75–86.CrossRef Zhang, X., Xu, Z., Jia, N., Yang, W., Feng, Q., Chen, W., et al. (2015). Denoising of 3D magnetic resonance images by using higher-order singular value decomposition. Medical Image Analysis, 19(1), 75–86.CrossRef
13.
Zurück zum Zitat Cong, F., Chen, J., Dong, G., & Zhao, F. (2013). Short-time matrix series based singular value decomposition for rolling bearing fault diagnosis. Mechanical Systems and Signal Processing, 34(1–2), 218–230.CrossRef Cong, F., Chen, J., Dong, G., & Zhao, F. (2013). Short-time matrix series based singular value decomposition for rolling bearing fault diagnosis. Mechanical Systems and Signal Processing, 34(1–2), 218–230.CrossRef
14.
Zurück zum Zitat Maruyama, R., Maeda, K., Moroda, H., Kato, I., Inoue, M., Miyakawa, H., et al. (2014). Detecting cells using non-negative matrix factorization on calcium imaging data. Neural Networks, 55, 11–19.CrossRef Maruyama, R., Maeda, K., Moroda, H., Kato, I., Inoue, M., Miyakawa, H., et al. (2014). Detecting cells using non-negative matrix factorization on calcium imaging data. Neural Networks, 55, 11–19.CrossRef
15.
Zurück zum Zitat Shiga, M., & Mamitsuka, H. (2015). Non-negative matrix factorization with auxiliary information on overlapping groups. IEEE Transactions on Knowledge and Data Engineering, 27(6), 1615–1628.CrossRef Shiga, M., & Mamitsuka, H. (2015). Non-negative matrix factorization with auxiliary information on overlapping groups. IEEE Transactions on Knowledge and Data Engineering, 27(6), 1615–1628.CrossRef
16.
Zurück zum Zitat Wang, J., Zhan, J., & Zhang, J. (2008). Towards real-time performance of data value hiding for frequent data updates. In Proceedings of the 2008 IEEE international conference on granular computing (pp. 606–611). Wang, J., Zhan, J., & Zhang, J. (2008). Towards real-time performance of data value hiding for frequent data updates. In Proceedings of the 2008 IEEE international conference on granular computing (pp. 606–611).
17.
Zurück zum Zitat Witten, I. H., Frank, E., & Hall, M. A. (2016). Data mining: Practical machine learning tools and techniques. Burlington, MA: Morgan Kaufmann. Witten, I. H., Frank, E., & Hall, M. A. (2016). Data mining: Practical machine learning tools and techniques. Burlington, MA: Morgan Kaufmann.
18.
Zurück zum Zitat Lichman, M. (2013). UCI machine learning repository [http://archive.ics.uci.edu/ml]. Irvine, CA: University of California, School of Information and Computer Science. Lichman, M. (2013). UCI machine learning repository [http://archive.ics.uci.edu/ml]. Irvine, CA: University of California, School of Information and Computer Science.
19.
Zurück zum Zitat Mangasarian, O. L., & Wolberg, W. H. (1990). Cancer diagnosis via linear programming. SIAM News, 23(5), 1 & 18. Mangasarian, O. L., & Wolberg, W. H. (1990). Cancer diagnosis via linear programming. SIAM News, 23(5), 1 & 18.
Metadaten
Titel
A New Privacy-Preserving Data Mining Method Using Non-negative Matrix Factorization and Singular Value Decomposition
verfasst von
Guang Li
Rui Xue
Publikationsdatum
05.01.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-5237-5

Weitere Artikel der Ausgabe 2/2018

Wireless Personal Communications 2/2018 Zur Ausgabe

Neuer Inhalt