Randomization in privacy preserving data mining
- 1 December 2002
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGKDD Explorations Newsletter
- Vol. 4 (2) , 43-48
- https://doi.org/10.1145/772862.772869
Abstract
Suppose there are many clients, each having some personal information, and one server, which is interested only in aggregate, statistically significant, properties of this information. The clients can protect privacy of their data by perturbing it with a randomization algorithm and then submitting the randomized version. The randomization algorithm is chosen so that aggregate properties of the data can be recovered with sufficient precision, while individual entries are significantly distorted. How much distortion is needed to protect privacy can be determined using a privacy measure. Several possible privacy measures are known; finding the best measure is an open question. This paper presents some methods and results in randomization for numerical and categorical data, and discusses the issue of measuring privacy.Keywords
This publication has 10 references indexed in Scilit:
- Tools for privacy preserving distributed data miningACM SIGKDD Explorations Newsletter, 2002
- Cryptographic techniques for privacy-preserving data miningACM SIGKDD Explorations Newsletter, 2002
- Transforming data to satisfy privacy constraintsPublished by Association for Computing Machinery (ACM) ,2002
- Privacy preserving mining of association rulesPublished by Association for Computing Machinery (ACM) ,2002
- On the design and quantification of privacy preserving data mining algorithmsPublished by Association for Computing Machinery (ACM) ,2001
- Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive NoiseJournal of the American Statistical Association, 2000
- Privacy-preserving data miningPublished by Association for Computing Machinery (ACM) ,2000
- Generalizing data to provide anonymity when disclosing information (abstract)Published by Association for Computing Machinery (ACM) ,1998
- Mining association rules between sets of items in large databasesPublished by Association for Computing Machinery (ACM) ,1993
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949