Skip to main content

2017 | OriginalPaper | Buchkapitel

Spatial Outlier Information Hiding Algorithm Based on Complex Transformation

verfasst von : Zhaoyu Shou, Akang Liu, Simin Li, Xiawei Cheng

Erschienen in: Security, Privacy, and Anonymity in Computation, Communication, and Storage

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The anomaly data is easily disturbed by malicious third party in the information sharing or transmission process. To guarantee the safety and integrity of outlier information, a novel method of outlier information privacy preserving is proposed, namely, spatial outlier information hiding algorithm based on complex transformation. Firstly, the anomaly dataset is obtained by outlier detection algorithm. Then the two-dimensional feature data of anomaly objects is selected to construct the complex data and complex factors. Finally, the outlier information is hidden by complex transformation. The receiver receives the hidden dataset and the complex factor set, in which the hidden data can be effectively restored. The feasibility and validity of this algorithm are verified by simulation and contrast experiment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang, G.R.: Privacy data preserving method based on fuzzy discretization. In: Eighth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 2, pp. 1201–1205. IEEE (2011) Zhang, G.R.: Privacy data preserving method based on fuzzy discretization. In: Eighth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 2, pp. 1201–1205. IEEE (2011)
2.
Zurück zum Zitat Shinde, A., et al.: Privacy prevention of sensitive rules and values using perturbation technique. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 577–581 (2016) Shinde, A., et al.: Privacy prevention of sensitive rules and values using perturbation technique. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 577–581 (2016)
3.
Zurück zum Zitat Ghate, R.B., Ingle, R.: Clustering based anonymization for privacy preservation. In: International Conference on Pervasive Computing, pp. 1–3. IEEE (2015) Ghate, R.B., Ingle, R.: Clustering based anonymization for privacy preservation. In: International Conference on Pervasive Computing, pp. 1–3. IEEE (2015)
4.
Zurück zum Zitat Rajalakshmi, V., Mala, G.S.A.: Data anonymization using augmented rotation of sub-clusters for privacy preservation in data mining. In: 2013 Fifth International Conference on Advanced Computing (ICoAC), pp. 22–26. IEEE (2013) Rajalakshmi, V., Mala, G.S.A.: Data anonymization using augmented rotation of sub-clusters for privacy preservation in data mining. In: 2013 Fifth International Conference on Advanced Computing (ICoAC), pp. 22–26. IEEE (2013)
5.
Zurück zum Zitat Rajalakshmi, V., Mala, G.S.A.: Anonymization by data relocation using sub-clustering for privacy preserving data mining. Indian J. Sci. Technol. 7(7), 975–980 (2014) Rajalakshmi, V., Mala, G.S.A.: Anonymization by data relocation using sub-clustering for privacy preserving data mining. Indian J. Sci. Technol. 7(7), 975–980 (2014)
6.
Zurück zum Zitat Oliveira, S.R.M., Zaane, O.R., Agropecuaria, E.I.: Privacy preserving clustering by data transformation. In: Proceedings of Brazilian Symposium on Databases, vol. 1, pp. 37–52 (2003) Oliveira, S.R.M., Zaane, O.R., Agropecuaria, E.I.: Privacy preserving clustering by data transformation. In: Proceedings of Brazilian Symposium on Databases, vol. 1, pp. 37–52 (2003)
7.
Zurück zum Zitat Li, L., Zhang, Q.: A privacy preserving clustering technique using hybrid data transformation method. In: IEEE International Conference on Grey Systems and Intelligent Services, pp. 1502–1506. IEEE (2009) Li, L., Zhang, Q.: A privacy preserving clustering technique using hybrid data transformation method. In: IEEE International Conference on Grey Systems and Intelligent Services, pp. 1502–1506. IEEE (2009)
8.
Zurück zum Zitat Liu, J., Xu, Y.: Privacy preserving clustering by random response method of geometric transformation. In: Fourth International Conference on Internet Computing for Science and Engineering, pp. 181–188. IEEE (2010) Liu, J., Xu, Y.: Privacy preserving clustering by random response method of geometric transformation. In: Fourth International Conference on Internet Computing for Science and Engineering, pp. 181–188. IEEE (2010)
9.
Zurück zum Zitat Gokulnath, C., Priyan, M.K., Balan, E.V., Prabha, K.P.R., Jeyanthi, R.: Preservation of privacy in data mining by using PCA based perturbation technique. In: International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials, pp. 202–206. IEEE Computer Society (2015) Gokulnath, C., Priyan, M.K., Balan, E.V., Prabha, K.P.R., Jeyanthi, R.: Preservation of privacy in data mining by using PCA based perturbation technique. In: International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials, pp. 202–206. IEEE Computer Society (2015)
10.
Zurück zum Zitat Ahmed, K.A., Rauf, H.A.: Privacy preserving data using fuzzy hybrid data transformation technique. Indian J. Sci. Technol. 10(24) (2017) Ahmed, K.A., Rauf, H.A.: Privacy preserving data using fuzzy hybrid data transformation technique. Indian J. Sci. Technol. 10(24) (2017)
11.
Zurück zum Zitat Vashkevich, A.V., Zhukov, V.G.: Privacy-preserving clustering using C-means. In: International Siberian Conference on Control and Communications, pp. 1–4. IEEE (2015) Vashkevich, A.V., Zhukov, V.G.: Privacy-preserving clustering using C-means. In: International Siberian Conference on Control and Communications, pp. 1–4. IEEE (2015)
12.
Zurück zum Zitat Dhiraj, S.S.S., Khan, A.M.A., Khan, W., Challagalla, A.: Privacy preservation in k-means clustering by cluster rotation. In: TENCON 2009 - 2009 IEEE Region 10 Conference, pp. 1–7. IEEE (2009) Dhiraj, S.S.S., Khan, A.M.A., Khan, W., Challagalla, A.: Privacy preservation in k-means clustering by cluster rotation. In: TENCON 2009 - 2009 IEEE Region 10 Conference, pp. 1–7. IEEE (2009)
13.
Zurück zum Zitat Lin, Z., Wang, J., Liu, L., Zhang, J.: Generalized random rotation perturbation for vertically partitioned data sets. In: IEEE Symposium on Computational Intelligence and Data Mining, pp. 159–162. IEEE (2009) Lin, Z., Wang, J., Liu, L., Zhang, J.: Generalized random rotation perturbation for vertically partitioned data sets. In: IEEE Symposium on Computational Intelligence and Data Mining, pp. 159–162. IEEE (2009)
14.
Zurück zum Zitat Leontiadis, I., Molva, R., Chorley, M.J., Colombo, G.B.: Privacy preserving similarity detection for data analysis. In: International Conference on Cloud & Green Computing, vol. 10, pp. 547–552. IEEE Computer Society (2013) Leontiadis, I., Molva, R., Chorley, M.J., Colombo, G.B.: Privacy preserving similarity detection for data analysis. In: International Conference on Cloud & Green Computing, vol. 10, pp. 547–552. IEEE Computer Society (2013)
15.
Zurück zum Zitat Shou, Z.-Y., Li, M.-Y., Li, S.-M.: Outlier detection based on multi-dimensional clustering and local density. J. Cent. South Univ. 24(6), 1299–1306 (2017)CrossRef Shou, Z.-Y., Li, M.-Y., Li, S.-M.: Outlier detection based on multi-dimensional clustering and local density. J. Cent. South Univ. 24(6), 1299–1306 (2017)CrossRef
16.
Zurück zum Zitat Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers, vol. 29(2), pp. 93–104 (2000) Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers, vol. 29(2), pp. 93–104 (2000)
17.
Zurück zum Zitat Rodriguez, A., Laio, A.: Clustering by fast search and find of density peaks. Science 344(6191), 1492–1496 (2014)CrossRef Rodriguez, A., Laio, A.: Clustering by fast search and find of density peaks. Science 344(6191), 1492–1496 (2014)CrossRef
19.
Zurück zum Zitat Challagalla, A., Dhiraj, S.S.S, Somayajulu, D.V.L.N., Mathew, T.S., Tiwari, S., Ahmad, S.S.: Privacy preserving outlier detection using hierarchical clustering methods. In: Computer Software and Applications Conference Workshops, pp. 152–157. IEEE (2010) Challagalla, A., Dhiraj, S.S.S, Somayajulu, D.V.L.N., Mathew, T.S., Tiwari, S., Ahmad, S.S.: Privacy preserving outlier detection using hierarchical clustering methods. In: Computer Software and Applications Conference Workshops, pp. 152–157. IEEE (2010)
20.
Zurück zum Zitat Zimek, A., Campello, R.J.G.B.: Data perturbation for outlier detection ensembles. In: International Conference on Scientific and Statistical Database Management, pp. 1–12. ACM (2014) Zimek, A., Campello, R.J.G.B.: Data perturbation for outlier detection ensembles. In: International Conference on Scientific and Statistical Database Management, pp. 1–12. ACM (2014)
Metadaten
Titel
Spatial Outlier Information Hiding Algorithm Based on Complex Transformation
verfasst von
Zhaoyu Shou
Akang Liu
Simin Li
Xiawei Cheng
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-72389-1_20