Skip to main content

2016 | OriginalPaper | Buchkapitel

Privacy Preserving Data Mining for Deliberative Consultations

verfasst von : Piotr Andruszkiewicz

Erschienen in: Hybrid Artificial Intelligent Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In deliberative consultations, which utilise electronic surveys as a tool to obtain information from residents, preserving privacy plays an important role. In this paper investigation of a possibility of privacy preserving data mining techniques application in deliberative consultations has been conducted. Three main privacy preserving techniques; namely, heuristic-based, reconstruction-based, and cryptography-based have been analysed and a setup for online surveys performed within deliberative consultations has been proposed.
This work can be useful for designers and administrators in the assessment of the privacy risks they face with a system for deliberative consultations. It can also be used in the process of privacy preserving incorporation in such a system in order to help minimise privacy risks to users.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The proof in the case of privacy preserving association rules mining can be found in [16].
 
Literatur
1.
Zurück zum Zitat Albrecht, S.: E-consultations: a review of current practice and a proposal for opening up the process. In: Tambouris, E., Macintosh, A., Sæbø, Ø. (eds.) ePart 2012. LNCS, vol. 7444, pp. 13–24. Springer, Heidelberg (2012)CrossRef Albrecht, S.: E-consultations: a review of current practice and a proposal for opening up the process. In: Tambouris, E., Macintosh, A., Sæbø, Ø. (eds.) ePart 2012. LNCS, vol. 7444, pp. 13–24. Springer, Heidelberg (2012)CrossRef
2.
Zurück zum Zitat Li, X., Yan, Z., Zhang, P.: A review on privacy-preserving data mining. In: 14th IEEE International Conference on Computer and Information Technology, CIT 2014, Xi’an, China, 11–13 September 2014, pp. 769–774. IEEE (2014) Li, X., Yan, Z., Zhang, P.: A review on privacy-preserving data mining. In: 14th IEEE International Conference on Computer and Information Technology, CIT 2014, Xi’an, China, 11–13 September 2014, pp. 769–774. IEEE (2014)
3.
Zurück zum Zitat Aggarwal, C.C.: Data Mining - The Textbook. Springer, Switzerland (2015)MATH Aggarwal, C.C.: Data Mining - The Textbook. Springer, Switzerland (2015)MATH
4.
Zurück zum Zitat Huai, M., Huang, L., Yang, W., Li, L., Qi, M.: Privacy-preserving naive bayes classification. In: Zhang, S., Wirsing, M., Zhang, Z. (eds.) KSEM 2015. LNCS, vol. 9403, pp. 627–638. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25159-2_57 CrossRef Huai, M., Huang, L., Yang, W., Li, L., Qi, M.: Privacy-preserving naive bayes classification. In: Zhang, S., Wirsing, M., Zhang, Z. (eds.) KSEM 2015. LNCS, vol. 9403, pp. 627–638. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-25159-2_​57 CrossRef
5.
Zurück zum Zitat Vaidya, J., Yu, H., Jiang, X.: Privacy-preserving svm classification. Knowl. Inf. Syst. 14(2), 161–178 (2008)CrossRef Vaidya, J., Yu, H., Jiang, X.: Privacy-preserving svm classification. Knowl. Inf. Syst. 14(2), 161–178 (2008)CrossRef
6.
Zurück zum Zitat Keyvanpour, M.R., Moradi, S.S.: A perturbation method based on singular value decomposition and feature selection for privacy preserving data mining. IJDWM 10(1), 55–76 (2014) Keyvanpour, M.R., Moradi, S.S.: A perturbation method based on singular value decomposition and feature selection for privacy preserving data mining. IJDWM 10(1), 55–76 (2014)
7.
Zurück zum Zitat Andruszkiewicz, P.: Frequent sets discovery in privacy preserving quantitative association rules mining. In: Onieva, E., Santos, I., Osaba, E., Quintian, H., Corchado, E. (eds.) HAIS 2015. LNCS, vol. 9121, pp. 3–15. Springer, Heidelberg (2015)CrossRef Andruszkiewicz, P.: Frequent sets discovery in privacy preserving quantitative association rules mining. In: Onieva, E., Santos, I., Osaba, E., Quintian, H., Corchado, E. (eds.) HAIS 2015. LNCS, vol. 9121, pp. 3–15. Springer, Heidelberg (2015)CrossRef
8.
Zurück zum Zitat Andruszkiewicz, P.: Hierarchical combining of classifiers in privacy preserving data mining. In: Polycarpou, M., de Carvalho, A.C.P.L.F., Pan, J.-S., Woźniak, M., Quintian, H., Corchado, E. (eds.) HAIS 2014. LNCS, vol. 8480, pp. 573–584. Springer, Heidelberg (2014)CrossRef Andruszkiewicz, P.: Hierarchical combining of classifiers in privacy preserving data mining. In: Polycarpou, M., de Carvalho, A.C.P.L.F., Pan, J.-S., Woźniak, M., Quintian, H., Corchado, E. (eds.) HAIS 2014. LNCS, vol. 8480, pp. 573–584. Springer, Heidelberg (2014)CrossRef
9.
Zurück zum Zitat Chen, K., Liu, L.: A survey of multiplicative perturbation for privacy-preserving data mining, [14], pp.157–181 Chen, K., Liu, L.: A survey of multiplicative perturbation for privacy-preserving data mining, [14], pp.157–181
10.
Zurück zum Zitat Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: ICDM, pp. 589–592. IEEE Computer Society (2005) Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: ICDM, pp. 589–592. IEEE Computer Society (2005)
11.
Zurück zum Zitat Liu, K., Giannella, C.M., Kargupta, H.: An attacker’s view of distance preserving maps for privacy preserving data mining. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 297–308. Springer, Heidelberg (2006)CrossRef Liu, K., Giannella, C.M., Kargupta, H.: An attacker’s view of distance preserving maps for privacy preserving data mining. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 297–308. Springer, Heidelberg (2006)CrossRef
12.
Zurück zum Zitat Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving olap. In: SIGMOD 2005, Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 251–262. ACM, New York (2005) Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving olap. In: SIGMOD 2005, Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 251–262. ACM, New York (2005)
13.
Zurück zum Zitat Saygin, Y., Verykios, V.S., Clifton, C.: Using unknowns to prevent discovery of association rules. SIGMOD Rec. 30(4), 45–54 (2001)CrossRef Saygin, Y., Verykios, V.S., Clifton, C.: Using unknowns to prevent discovery of association rules. SIGMOD Rec. 30(4), 45–54 (2001)CrossRef
14.
Zurück zum Zitat Aggarwal, C.C., Yu, P.S. (eds.): Privacy-Preserving Data Mining - Models and Algorithms. Advances in Database Systems, vol. 34. Springer, Heidelberg (2008) Aggarwal, C.C., Yu, P.S. (eds.): Privacy-Preserving Data Mining - Models and Algorithms. Advances in Database Systems, vol. 34. Springer, Heidelberg (2008)
15.
Zurück zum Zitat Domingo-ferrer, J., Mateo-sanz, J.M.: On resampling for statistical confidentiality in contingency tables. Comput. Math. Appl. 38, 13–32 (1999)MathSciNetCrossRefMATH Domingo-ferrer, J., Mateo-sanz, J.M.: On resampling for statistical confidentiality in contingency tables. Comput. Math. Appl. 38, 13–32 (1999)MathSciNetCrossRefMATH
16.
Zurück zum Zitat Atallah, M.J., Bertino, E., Elmagarmid, A.K., Ibrahim, M., Verykios, V.S.: Disclosure limitation of sensitive rules. In: Proceedings of the IEEE Knowledge and Data Engineering Workshop, pp. 45–52 (1999) Atallah, M.J., Bertino, E., Elmagarmid, A.K., Ibrahim, M., Verykios, V.S.: Disclosure limitation of sensitive rules. In: Proceedings of the IEEE Knowledge and Data Engineering Workshop, pp. 45–52 (1999)
17.
Zurück zum Zitat Weng, C.C., Chen, S.T., Lo, H.C.: A novel algorithm for completely hiding sensitive association rules. In: Pan, J.S., Abraham, A., Chang, C.C. (eds.) ISDA, vol. 3, pp. 202–208. IEEE Computer Society (2008) Weng, C.C., Chen, S.T., Lo, H.C.: A novel algorithm for completely hiding sensitive association rules. In: Pan, J.S., Abraham, A., Chang, C.C. (eds.) ISDA, vol. 3, pp. 202–208. IEEE Computer Society (2008)
18.
Zurück zum Zitat Li, X., Liu, Z., Zuo, C.: Hiding association rules based on relative-non-sensitive frequent itemsets. In: Baciu, G., Wang, Y., Yao, Y., Kinsner, W., Chan, K., Zadeh, L.A. (eds.) IEEE ICCI, pp. 384–389. IEEE Computer Society (2009) Li, X., Liu, Z., Zuo, C.: Hiding association rules based on relative-non-sensitive frequent itemsets. In: Baciu, G., Wang, Y., Yao, Y., Kinsner, W., Chan, K., Zadeh, L.A. (eds.) IEEE ICCI, pp. 384–389. IEEE Computer Society (2009)
19.
Zurück zum Zitat Modi, C.N., Rao, U.P., Patel, D.R.: An efficient solution for privacy preserving association rule mining. Int. J. Comput. Netw. Secur. 2(5), 79–85 (2010) Modi, C.N., Rao, U.P., Patel, D.R.: An efficient solution for privacy preserving association rule mining. Int. J. Comput. Netw. Secur. 2(5), 79–85 (2010)
20.
Zurück zum Zitat Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162–167. IEEE (1986) Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162–167. IEEE (1986)
21.
Zurück zum Zitat Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218–229. ACM (1987) Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218–229. ACM (1987)
22.
Zurück zum Zitat Patsakis, C., Laird, P., Clear, M., Bouroche, M., Solanas, A.: Interoperable privacy-aware e-participation within smart cities. Computer 48(1), 52–58 (2015)CrossRef Patsakis, C., Laird, P., Clear, M., Bouroche, M., Solanas, A.: Interoperable privacy-aware e-participation within smart cities. Computer 48(1), 52–58 (2015)CrossRef
23.
Zurück zum Zitat Gentry, C.: Fully homomorphic encryption using ideal lattices. In Mitzenmacher, M. (ed.) STOC, pp. 169–178. ACM (2009) Gentry, C.: Fully homomorphic encryption using ideal lattices. In Mitzenmacher, M. (ed.) STOC, pp. 169–178. ACM (2009)
24.
Zurück zum Zitat Du, W., Han, Y.S., Chen, S.: Privacy-preserving multivariate statistical analysis: linear regression and classification. In: SDM (2004) Du, W., Han, Y.S., Chen, S.: Privacy-preserving multivariate statistical analysis: linear regression and classification. In: SDM (2004)
25.
Zurück zum Zitat Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: KDD 2002, Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Press, pp. 217–228. ACM, New York (2002) Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: KDD 2002, Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Press, pp. 217–228. ACM, New York (2002)
26.
Zurück zum Zitat Yang, Z., Zhong, S., Wright, R.N.: Privacy-preserving classification of customer data without loss of accuracy. In: SDM (2005) Yang, Z., Zhong, S., Wright, R.N.: Privacy-preserving classification of customer data without loss of accuracy. In: SDM (2005)
Metadaten
Titel
Privacy Preserving Data Mining for Deliberative Consultations
verfasst von
Piotr Andruszkiewicz
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-32034-2_9