SVD based Data Transformation Methods for Privacy Preserving Clustering

privacy issues are major concern for many government and other private organizations to delve important information from large repositories of data. Privacy preserving clustering which is one of the techniques emerged to addresses the problem of extracting useful clustering patterns from distorted data without accessing the original data directly. In this paper two hybrid data transformation methods are proposed for privacy preserving clustering in centralized database environment based on Singular Value Decomposition (SVD). In hybrid method one, SVD and rotation data perturbation are used as a combination to obtain the distorted dataset. In hybrid method two, SVD and independent component analysis are used as a combination to obtain the distorted dataset. In SVD the data is analyzed in different perspectives to retain important information. Higher order statistics which contains more important information is utilized in independent component analysis. Experimental results demonstrate that the proposed methods are efficiently protects the private data of individuals and retains the important information for clustering analysis.

[1]  Yadong Wang,et al.  A Privacy-Preserving Classification Method Based on Singular Value Decomposition , 2012, Int. Arab J. Inf. Technol..

[2]  Jie Wang,et al.  Knowledge and Information Systems REGULAR PAPER , 2006 .

[3]  Jie Wang,et al.  Towards real-time performance of data value hiding for frequent data updates , 2008, 2008 IEEE International Conference on Granular Computing.

[4]  E. Clayton Ethical, legal, and social implications of genomic medicine. , 2003, The New England journal of medicine.

[5]  Jie Wang,et al.  Selective Data Distortion via Structural Partition and SSVD for Privacy Preservation , 2006, IKE.

[6]  D.K. Bhattacharyya,et al.  Privacy Preserving Clustering-A Hybrid Approach , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[7]  Seungjin Choi,et al.  Independent Component Analysis , 2009, Handbook of Natural Computing.

[8]  Elisa Bertino,et al.  A Framework for Evaluating Privacy Preserving Data Mining Algorithms* , 2005, Data Mining and Knowledge Discovery.

[9]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[10]  K. Duraiswamy,et al.  CLUST-SVD: Privacy preserving clustering in singular value decomposition , 2008 .

[11]  Osmar R. Zaïane,et al.  Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..