An Improved Technique for Privacy Preserving Clustering Based on Daubechies-2 Wavelet Transform

Having high accuracy results in data clustering and preserving the privacy of data are among the main challenges in privacy preserving clustering (PPC) techniques. High dimensionality of data is another challenge in PPC, which reduces the efficiency of the data mining algorithms. Therefore, PPC algorithms are divided into two categories. The algorithms in the first category protect the data privacy and do not reduce the data dimensionality whereas the algorithms in the second category not only preserve the data privacy but also reduce the data dimensionality. The techniques based on geometric data transformation methods (GTDMs) are related to the first category whereas the techniques based on random projection (RP), discrete cosine transform (DCT) and Haar wavelet transform (HWT) are related to the second category. The GTDMs algorithms do not reduce the data dimensionality. This is the main drawback of this algorithm which causes reduction in the performance of data mining algorithm in large datasets. The...

[1]  Chris Clifton,et al.  Privacy-preserving clustering with distributed EM mixture modeling , 2004, Knowledge and Information Systems.

[2]  Sanjay Bapna,et al.  A Wavelet-Based Approach to Preserve Privacy for Classification Mining , 2006, Decis. Sci..

[3]  Osmar R. Zaïane,et al.  Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach , 2007, Int. J. Inf. Secur. Priv..

[4]  Aryya Gangopadhyay,et al.  A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms , 2006, The VLDB Journal.

[5]  Osmar R. Zaïane,et al.  A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration , 2007, Comput. Secur..

[6]  Mohammad Abdollahi Azgomi,et al.  A privacy preserving clustering technique for horizontally and vertically distributed datasets , 2011, Intell. Data Anal..

[7]  Chris Clifton,et al.  Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.

[8]  Josphat Igadwa Mwasiagi,et al.  Self Organizing Maps - Applications and Novel Algorithm Design , 2011 .

[9]  Hiroshi Motoda,et al.  Feature Extraction, Construction and Selection , 1998 .

[10]  Gregory J. Walters,et al.  Privacy and security: an ethical analysis , 2001, CSOC.

[11]  Mohammad Abdollahi Azgomi,et al.  On the Use of Haar Wavelet Transform and Scaling Data perturbation for Privacy Preserving Clustering of Large Datasets , 2011, Int. J. Wavelets Multiresolution Inf. Process..

[12]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[13]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[14]  Shenghuo Zhu,et al.  A survey on wavelet applications in data mining , 2002, SKDD.

[15]  Jan Schlörer,et al.  Security of statistical databases: multidimensional transformation , 1980, TODS.