Privacy Preserving Data Mining. Danushka Bollegala COMP 527
|
|
- Adelia Hawkins
- 5 years ago
- Views:
Transcription
1 Privacy Preserving ata Mining anushka Bollegala COMP 527
2 Privacy Issues ata mining attempts to ind mine) interesting patterns rom large datasets However, some o those patterns might reveal inormation that users would not like to be disclosed diseases/medical records o patients credit worthiness past conviction records exam marks? It is like that an organization X and Y possess mutually useul data, and would like to use each other s data or data mining, but do not want to share the actual data. Can data mining and privacy co-exist? Privacy Preserving ata Mining PPM) 2
3 Privacy Preserving ata Mining PPM) PPM is a sub-ield in M that studies methods that can be used to perorm various data mining tasks e.g. decision tree learning, k-means clustering etc.) at the same time preserving the privacy o the users. Two main approaches exist Anonymization perturb with noise, abstract) Add some noise to the data points so that it is not possible to uniquely determine a user We would like to add the least amount o noise such that it is easier to perorm data mining tasks on the anonymized data. Encryption perorm M tasks on encrypted data) Each party that possess some data encrypts their data using their private keys. We will perorm M operations directly on the encrypted data Secure but is time consuming encryption/decryption) 3
4 inning Cryptographers A group o cryptographers go out or dinner. Ater the dinner the waiter brings the bill and says it has already been paid or. However, the cryptographers are uneasy about this and would like to know whether any one o them paid the bill or was it an outsider. The cryptographer who paid the bill i some one rom this group did so) would like to keep this act a secret. Conditions waiter is honest and cannot be bribed. How can we ind out whether some one in this group paid the bill or was it an outsider NSA paid the bill!)? 4
5 Two Millionaires Problem Two millionaires want to know who has more money. But they do not want to disclose their wealth. c. Yao s millionaires problem 5
6 Secure istributed Sum s 1 = v 1 + R s 6 = s 5 + v s 2 = s 1 + v s 3 = s 2 + v 3 s 5 = s 4 + v 5 4 s 4 = s 3 + v 4 Can we compute the sum without revealing the individual numbers? v 1 + v 2 + v 3 + v 4 + v 5 + v 6 6
7 Link Attack Although we might have anonymized two databases, by combining linking) the two we might be able to identiy the users. Can identiy the medical record o the MA mayor by linking the voting database and medical record database. 87% o the people can be identiied by combining zipcode, sex, and date o birth according to 1990 US census. 6 people have the date o birth same as the mayor s. 3 males 1 matches the zip code! 7
8 Explicit identiiers Anonymization Can uniquely identiy a person. Needs to be deleted or anonymized Quasi identiiers QI) By combining with external resources can be used to identiy a person name date o birth sex zip disease Mark Taylor 21/1/70 M inluenza Ann Silvia 10/1/81 F AIS Lindsay Smith 1/10/44 F tooth ache Michael Jordon 21/2/84 M bronchitis Steve Jobs 19/4/72 M cancer 8
9 k-anonymity Proposed by Sweeney and Samarati [2001, 2002] By modiying the quasi identiiers anonymize an individual with k-1) others in the database. In a k-anonymized database, we will have at least k dierent individuals with the same combination o values or the quasi identiiers. The probability o uniquely identiying an individual via a link attack reduces to 1/k. Techniques or implementing k-anonymity Generalization Suppression 9
10 original data Example date o birth sex zipcode 21/1/79 Male /1/79 Female /10/44 Female /2/83 Male /4/82 Male 2237 k-anonymized data group 1 date o birth sex zipcode */1/79 Human 5**** */1/79 Human 5**** suppress 1/10/44 Female group 2 */*/8* Male 22** */*/8* Male 22** 10
11 Generalization/Abstraction Given a hierarchy ontology) o concepts/attributes, various generalization methods exist. We must select the generalization method with the least compromise with the anonymization. proessions proessionals artists engineer medic actor musician 11
12 Minimal distortion metric M) The number o data points entries/records/rows) lost due to anonymization. e.g. I we anonymize 5 males/emales as human then M = 5. Anonymization has a trade-o between the distortion and the level o privacy achieved. IGPLs) = Inormation Gain IG) Privacy Loss PL) 12
13 Issues o k-anonymity Ater anonymization we can still make some inerences about a particular individual because there is no noise in the data. When the dimensionality o the data increases, the probability o uniquely identiying an individual increases or a ixed k value. I John is rom Keral and is 19 years ol then we know that he has cancer, heart diseases, or viral inection. slide credit: Wikipedia 13
14 ierential Privacy Let us assume that we have two databases 1 and 2 that are diering in only one record. External users must not be able to identiy this record by issuing any queries to 1 and 2. We must answer to the queries issues to 1 and 2 such that the answer contains suicient noise to avoid revealing the diering record. 1 2 α 14
15 Example atabase o a hospital H beore and ater John has been admitted No o patients with lu = 10 No o patients with lu = 11 getflupatients) = getflupatients) = 11-2 We answer the query asked via a unction ) using some noise shown in red so that an attacker will not be able to ind out that John has lu. 15
16 ierential Privacy 16 t = X)+Y pt 1)) apple e pt 2)) log pt 1)) pt 2)) apple Laplace )= 1 2 exp t p t t t t t p t p exp 2) 1) exp 2) 1) exp 2) 1) exp / 2) exp / 1) exp 2)) 1)) Laplace X t Y Laplace X t p Y p ~ ) ) 2 1 max ,
17 Privacy using Encryption A and B would like to perorm data mining using both their databases. But they do not want to share their raw data. Solution Encrypt the data using their public keys and perorm statistical operation on the encrypted data. An important property o the homomorphic encryption I we denote the encryption o a message x using a public key pk as Epkx), then the ollowing holds Epkx + y) = Epkx) x Epky) In RSA or example Epkx) = xe mod m, where m is the public key and e is an exponent. 17
18 Applications k-means clustering over a distributed database. Each party has a subset o non-overlapping) attributes. We would like to cluster the data using k-means but do not want the parties to share their attributes. vertical partitioning o a database Clustering data points based on each partition might lead to incorrect results. 18
19 Vertical partitioning o a database age sex height weight proession location 19
20 Issues o cryptography-based PPM Slow in practice Multiple encryption-decryption steps required, which can be slow or large databases. k-means or a database with 1000 records taking as much as one hour! Tend to be complicated algorithms see Vaidya+Cliton K 03 or the details o the vertical partitioned k-means algorithm 20
K ANONYMITY. Xiaoyong Zhou
K ANONYMITY LATANYA SWEENEY Xiaoyong Zhou DATA releasing: Privacy vs. Utility Society is experiencing exponential growth in the number and variety of data collections containing person specific specific
More informationSecurity Control Methods for Statistical Database
Security Control Methods for Statistical Database Li Xiong CS573 Data Privacy and Security Statistical Database A statistical database is a database which provides statistics on subsets of records OLAP
More informationPrivacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University
Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy Xiaokui Xiao Nanyang Technological University Outline Privacy preserving data publishing: What and Why Examples of privacy attacks
More informationIntroduction to Data Mining
Introduction to Data Mining Privacy preserving data mining Li Xiong Slides credits: Chris Clifton Agrawal and Srikant 4/3/2011 1 Privacy Preserving Data Mining Privacy concerns about personal data AOL
More informationK-Anonymity and Other Cluster- Based Methods. Ge Ruan Oct. 11,2007
K-Anonymity and Other Cluster- Based Methods Ge Ruan Oct 11,2007 Data Publishing and Data Privacy Society is experiencing exponential growth in the number and variety of data collections containing person-specific
More informationAchieving k-anonmity* Privacy Protection Using Generalization and Suppression
UT DALLAS Erik Jonsson School of Engineering & Computer Science Achieving k-anonmity* Privacy Protection Using Generalization and Suppression Murat Kantarcioglu Based on Sweeney 2002 paper Releasing Private
More informationSecure Multiparty Computation
CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationData Anonymization - Generalization Algorithms
Data Anonymization - Generalization Algorithms Li Xiong CS573 Data Privacy and Anonymity Generalization and Suppression Z2 = {410**} Z1 = {4107*. 4109*} Generalization Replace the value with a less specific
More informationSecure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining
CS573 Data Privacy and Security Secure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining Li Xiong Slides credit: Chris Clifton, Purdue University; Murat Kantarcioglu, UT
More informationData Anonymization. Graham Cormode.
Data Anonymization Graham Cormode graham@research.att.com 1 Why Anonymize? For Data Sharing Give real(istic) data to others to study without compromising privacy of individuals in the data Allows third-parties
More informationSurvey of k-anonymity
NATIONAL INSTITUTE OF TECHNOLOGY ROURKELA Survey of k-anonymity by Ankit Saroha A thesis submitted in partial fulfillment for the degree of Bachelor of Technology under the guidance of Dr. K. S. Babu Department
More informationPrivacy-Preserving Data Mining in the Fully Distributed Model
Privacy-Preserving Data Mining in the Fully Distributed Model Rebecca Wright Stevens Institute of Technology www.cs.stevens.edu/~rwright MADNES 05 22 September, 2005 (Includes joint work with Zhiqiang
More informationCS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong
CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationPrivacy-Preserving Machine Learning
Privacy-Preserving Machine Learning CS 760: Machine Learning Spring 2018 Mark Craven and David Page www.biostat.wisc.edu/~craven/cs760 1 Goals for the Lecture You should understand the following concepts:
More informationTowards the Anonymisation of RDF Data
Towards the Anonymisation of RDF Data Filip Radulovic Ontology Engineering Group ETSI Informáticos Universidad Politécnica de Madrid Madrid, Spain fradulovic@fi.upm.es Raúl García-Castro Ontology Engineering
More informationSurvey of Anonymity Techniques for Privacy Preserving
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Survey of Anonymity Techniques for Privacy Preserving Luo Yongcheng
More informationMessage authentication
Message authentication -- Reminder on hash unctions -- MAC unctions hash based block cipher based -- Digital signatures (c) Levente Buttyán (buttyan@crysys.hu) Hash unctions a hash unction is a unction
More informationPrivacy Preserving Service Discovery for Interoperability in Power to the Edge Approach Research and Development Initiative, Chuo University
Privacy Preserving Service Discovery for Interoperability in Power to the Edge Approach Research and Development Initiative, Chuo University Hiroshi Yamaguchi, Masahito Gotaishi, Shigeo Tsujii, Norihisa
More informationCS573 Data Privacy and Security. Li Xiong
CS573 Data Privacy and Security Anonymizationmethods Li Xiong Today Clustering based anonymization(cont) Permutation based anonymization Other privacy principles Microaggregation/Clustering Two steps:
More informationAn Efficient Clustering Method for k-anonymization
An Efficient Clustering Method for -Anonymization Jun-Lin Lin Department of Information Management Yuan Ze University Chung-Li, Taiwan jun@saturn.yzu.edu.tw Meng-Cheng Wei Department of Information Management
More informationA FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING
A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING 1 B.KARTHIKEYAN, 2 G.MANIKANDAN, 3 V.VAITHIYANATHAN 1 Assistant Professor, School of Computing, SASTRA University, TamilNadu, India. 2 Assistant
More informationAn Overview of Secure Multiparty Computation
An Overview of Secure Multiparty Computation T. E. Bjørstad The Selmer Center Department of Informatics University of Bergen Norway Prøveforelesning for PhD-graden 2010-02-11 Outline Background 1 Background
More informationData Security and Privacy. Topic 18: k-anonymity, l-diversity, and t-closeness
Data Security and Privacy Topic 18: k-anonymity, l-diversity, and t-closeness 1 Optional Readings for This Lecture t-closeness: Privacy Beyond k-anonymity and l-diversity. Ninghui Li, Tiancheng Li, and
More informationSlicing Technique For Privacy Preserving Data Publishing
Slicing Technique For Privacy Preserving Data Publishing D. Mohanapriya #1, Dr. T.Meyyappan M.Sc., MBA. M.Phil., Ph.d., 2 # Department of Computer Science and Engineering, Alagappa University, Karaikudi,
More informationA Machine Learning Approach to Privacy-Preserving Data Mining Using Homomorphic Encryption
A Machine Learning Approach to Privacy-Preserving Data Mining Using Homomorphic Encryption Seiichi Ozawa Center for Mathematical Data Science Graduate School of Engineering Kobe University 2 What is PPDM?
More informationPartition Based Perturbation for Privacy Preserving Distributed Data Mining
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 2 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0015 Partition Based Perturbation
More informationPreserving Privacy during Big Data Publishing using K-Anonymity Model A Survey
ISSN No. 0976-5697 Volume 8, No. 5, May-June 2017 International Journal of Advanced Research in Computer Science SURVEY REPORT Available Online at www.ijarcs.info Preserving Privacy during Big Data Publishing
More informationSMMCOA: Maintaining Multiple Correlations between Overlapped Attributes Using Slicing Technique
SMMCOA: Maintaining Multiple Correlations between Overlapped Attributes Using Slicing Technique Sumit Jain 1, Abhishek Raghuvanshi 1, Department of information Technology, MIT, Ujjain Abstract--Knowledge
More informationOn the Design and Analysis of the Privacy-Preserving SVM Classifier. Keng-Pei Lin and Ming-Syan Chen, Fellow, IEEE
On the Design and Analysis of the Privacy-Preserving SVM Classifier Keng-Pei Lin and Ming-Syan Chen, Fellow, IEEE Abstract The support vector machine (SVM) is a widely used tool in classification problems.
More informationMTAT Research Seminar in Cryptography Building a secure aggregation database
MTAT.07.006 Research Seminar in Cryptography Building a secure aggregation database Dan Bogdanov University of Tartu, Institute of Computer Science 22.10.2006 1 Introduction This paper starts by describing
More informationSecure Multiparty Computation
Secure Multiparty Computation Li Xiong CS573 Data Privacy and Security Outline Secure multiparty computation Problem and security definitions Basic cryptographic tools and general constructions Yao s Millionnare
More informationPrivacy Preserved Data Publishing Techniques for Tabular Data
Privacy Preserved Data Publishing Techniques for Tabular Data Keerthy C. College of Engineering Trivandrum Sabitha S. College of Engineering Trivandrum ABSTRACT Almost all countries have imposed strict
More informationA Formal Model to Preserve Knowledge in Outsourced Datasets
A Formal Model to Preserve Knowledge in Outsourced Datasets 1 Veera Ragavan K, 2 Karthick S 1 ME Student, 2 Asst.Prof 1,2 Dept of Software Engineering, SRM University, Chennai, India 1 ragu.skp@gmail.com,
More informationSteps Towards Location Privacy
Steps Towards Location Privacy Subhasish Mazumdar New Mexico Institute of Mining & Technology Socorro, NM 87801, USA. DataSys 2018 Subhasish.Mazumdar@nmt.edu DataSys 2018 1 / 53 Census A census is vital
More informationSecured Medical Data Publication & Measure the Privacy Closeness Using Earth Mover Distance (EMD)
Vol.2, Issue.1, Jan-Feb 2012 pp-208-212 ISSN: 2249-6645 Secured Medical Data Publication & Measure the Privacy Closeness Using Earth Mover Distance (EMD) Krishna.V #, Santhana Lakshmi. S * # PG Student,
More informationPrivacy Preserving Health Data Mining
IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Privacy Preserving Health Data Mining 1 Somy.M.S, 2 Gayatri.K.S, 3 Ashwini.B 1,2,3 Dept. of CSE, Mar Baselios
More informationSurvey Result on Privacy Preserving Techniques in Data Publishing
Survey Result on Privacy Preserving Techniques in Data Publishing S.Deebika PG Student, Computer Science and Engineering, Vivekananda College of Engineering for Women, Namakkal India A.Sathyapriya Assistant
More informationA Survey on A Privacy Preserving Technique using K-means Clustering Algorithm
A Survey on A Privacy Preserving Technique using K-means Clustering Algorithm Falguni A.Patel 1, Chetna G.Chand 2 1 Student(Master of Engineering), Computer Engineering Department, Government Engineering
More information(α, k)-anonymity: An Enhanced k-anonymity Model for Privacy-Preserving Data Publishing
(α, k)-anonymity: An Enhanced k-anonymity Model for Privacy-Preserving Data Publishing Raymond Chi-Wing Wong, Jiuyong Li +, Ada Wai-Chee Fu and Ke Wang Department of Computer Science and Engineering +
More information(More) cryptographic protocols
(More) cryptographic protocols Myrto Arapinis School of Informatics University of Edinburgh October 19, 2017 1/24 Authentication and key agreement protocols 2/24 Authentication and key agreement Long-term
More informationPrivacy, Security & Ethical Issues
Privacy, Security & Ethical Issues How do we mine data when we can t even look at it? 2 Individual Privacy Nobody should know more about any entity after the data mining than they did before Approaches:
More informationNeighbourhood Operations
Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle
More informationHIDE: Privacy Preserving Medical Data Publishing. James Gardner Department of Mathematics and Computer Science Emory University
HIDE: Privacy Preserving Medical Data Publishing James Gardner Department of Mathematics and Computer Science Emory University jgardn3@emory.edu Motivation De-identification is critical in any health informatics
More informationParallel Composition Revisited
Parallel Composition Revisited Chris Clifton 23 October 2017 This is joint work with Keith Merrill and Shawn Merrill This work supported by the U.S. Census Bureau under Cooperative Agreement CB16ADR0160002
More informationResearch Trends in Privacy Preserving in Association Rule Mining (PPARM) On Horizontally Partitioned Database
204 IJEDR Volume 2, Issue ISSN: 232-9939 Research Trends in Privacy Preserving in Association Rule Mining (PPARM) On Horizontally Partitioned Database Rachit Adhvaryu, 2 Nikunj Domadiya PG Student, 2 Professor
More informationOptimal k-anonymity with Flexible Generalization Schemes through Bottom-up Searching
Optimal k-anonymity with Flexible Generalization Schemes through Bottom-up Searching Tiancheng Li Ninghui Li CERIAS and Department of Computer Science, Purdue University 250 N. University Street, West
More informationIncognito: Efficient Full Domain K Anonymity
Incognito: Efficient Full Domain K Anonymity Kristen LeFevre David J. DeWitt Raghu Ramakrishnan University of Wisconsin Madison 1210 West Dayton St. Madison, WI 53706 Talk Prepared By Parul Halwe(05305002)
More informationEmerging Measures in Preserving Privacy for Publishing The Data
Emerging Measures in Preserving Privacy for Publishing The Data K.SIVARAMAN 1 Assistant Professor, Dept. of Computer Science, BIST, Bharath University, Chennai -600073 1 ABSTRACT: The information in the
More informationInternational Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 ISSN V.Sathya, and Dr.V.
International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 52 Encryption-Based Techniques For Privacy Preserving Data Mining V.Sathya, and Dr.V. Gayathiri ABSTRACT: In present
More informationEating from the Tree of Ignorance Part 2
Eating from the Tree of Ignorance Part 2 Jan van Eijck, CWI Amsterdam and Uil-OTS Utrecht Rineke Verbrugge, Institute of AI, University of Groningen ESSLLI 2009, Bordeaux, July 22, 2009 Overview of Part
More informationDistributed Privacy Preserving Data Collection using Cryptographic Techniques
Distributed Privacy Preserving Data Collection using Cryptographic Techniques Mingqiang Xue 1, Panagiotis Papadimitriou 2, Chedy Raïssi 1, Panos Kalnis 3 and Hung Keng Pung 1 1 Computer Science Department,
More informationCLUSTERING is one major task of exploratory data. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
1 Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset Jiawei Yuan, Member, IEEE, Yifan Tian, Student Member, IEEE Abstract Clustering techniques have been widely adopted
More informationAutomated Information Retrieval System Using Correlation Based Multi- Document Summarization Method
Automated Information Retrieval System Using Correlation Based Multi- Document Summarization Method Dr.K.P.Kaliyamurthie HOD, Department of CSE, Bharath University, Tamilnadu, India ABSTRACT: Automated
More informationSolution of Exercise Sheet 11
Foundations of Cybersecurity (Winter 16/17) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Solution of Exercise Sheet 11 1 Breaking Privacy By Linking Data The
More informationPrivacy-Preserving. Introduction to. Data Publishing. Concepts and Techniques. Benjamin C. M. Fung, Ke Wang, Chapman & Hall/CRC. S.
Chapman & Hall/CRC Data Mining and Knowledge Discovery Series Introduction to Privacy-Preserving Data Publishing Concepts and Techniques Benjamin C M Fung, Ke Wang, Ada Wai-Chee Fu, and Philip S Yu CRC
More information9.8 Graphing Rational Functions
9. Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm P where P and Q are polynomials. Q An eample o a simple rational unction
More informationEncrypted Data Deduplication in Cloud Storage
Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline
More informationDistributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud
Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud R. H. Jadhav 1 P.E.S college of Engineering, Aurangabad, Maharashtra, India 1 rjadhav377@gmail.com ABSTRACT: Many
More informationIntroduction To Security and Privacy Einführung in die IT-Sicherheit I
Introduction To Security and Privacy Einführung in die IT-Sicherheit I Prof. Dr. rer. nat. Doğan Kesdoğan Institut für Wirtschaftsinformatik kesdogan@fb5.uni-siegen.de http://www.uni-siegen.de/fb5/itsec/
More informationPrivacy-preserving machine learning. Bo Liu, the HKUST March, 1st, 2015.
Privacy-preserving machine learning Bo Liu, the HKUST March, 1st, 2015. 1 Some slides extracted from Wang Yuxiang, Differential Privacy: a short tutorial. Cynthia Dwork, The Promise of Differential Privacy.
More informationSIMPLE AND EFFECTIVE METHOD FOR SELECTING QUASI-IDENTIFIER
31 st July 216. Vol.89. No.2 25-216 JATIT & LLS. All rights reserved. SIMPLE AND EFFECTIVE METHOD FOR SELECTING QUASI-IDENTIFIER 1 AMANI MAHAGOUB OMER, 2 MOHD MURTADHA BIN MOHAMAD 1 Faculty of Computing,
More informationL-Diversity Algorithm for Incremental Data Release
Appl. ath. Inf. Sci. 7, No. 5, 2055-2060 (203) 2055 Applied athematics & Information Sciences An International Journal http://dx.doi.org/0.2785/amis/070546 L-Diversity Algorithm for Incremental Data Release
More informationDISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 May, 2014 Page No. 5594-5599 DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING
More informationAnalysis of Partially and Fully Homomorphic Encryption
Analysis of Partially and Fully Homomorphic Encryption Liam Morris lcm1115@rit.edu Department of Computer Science, Rochester Institute of Technology, Rochester, New York May 10, 2013 1 Introduction Homomorphic
More informationMASTER S THESIS. Yohannes Kifle Russom. Computer Science. Study program/ Specialization: Spring semester, Open / Restricted access.
Faculty of Science and Technology MASTER S THESIS Study program/ Specialization: Computer Science Spring semester, 2013 Open / Restricted access Writer: Yohannes Kifle Russom Faculty supervisor: (Writer
More informationEnhanced Slicing Technique for Improving Accuracy in Crowdsourcing Database
Enhanced Slicing Technique for Improving Accuracy in Crowdsourcing Database T.Malathi 1, S. Nandagopal 2 PG Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,
More informationMaintaining K-Anonymity against Incremental Updates
Maintaining K-Anonymity against Incremental Updates Jian Pei Jian Xu Zhibin Wang Wei Wang Ke Wang Simon Fraser University, Canada, {jpei, wang}@cs.sfu.ca Fudan University, China, {xujian, 55, weiwang}@fudan.edu.cn
More informationSolution of Exercise Sheet 10
Foundations of Cybersecurity (Winter 16/17) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Solution of Exercise Sheet 10 1 Diffie-Hellman Key Exchange Alice and
More informationPrivacy Preserving in Knowledge Discovery and Data Publishing
B.Lakshmana Rao, G.V Konda Reddy and G.Yedukondalu 33 Privacy Preserving in Knowledge Discovery and Data Publishing B.Lakshmana Rao 1, G.V Konda Reddy 2, G.Yedukondalu 3 Abstract Knowledge Discovery is
More informationECEN Security and Privacy for Big Data. Introduction Professor Yanmin Gong 08/22/2017
ECEN 5060 - Security and Privacy for Big Data Introduction Professor Yanmin Gong 08/22/2017 Administrivia Course Hour: T/R 3:30-4:45 pm @ CLB 101 Office Hour: T/R 2:30-3:30 pm Any question besides assignment
More informationSecuring Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh
Securing Distributed Computation via Trusted Quorums Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Setting Distributed computation over data contributed by users Communication through a central party
More informationA Review of Privacy Preserving Data Publishing Technique
A Review of Privacy Preserving Data Publishing Technique Abstract:- Amar Paul Singh School of CSE Bahra University Shimla Hills, India Ms. Dhanshri Parihar Asst. Prof (School of CSE) Bahra University Shimla
More informationPrivacy in Statistical Databases
Privacy in Statistical Databases CSE 598D/STAT 598B Fall 2007 Lecture 2, 9/13/2007 Aleksandra Slavkovic Office hours: MW 3:30-4:30 Office: Thomas 412 Phone: x3-4918 Adam Smith Office hours: Mondays 3-5pm
More informationIJSER. Privacy and Data Mining
Privacy and Data Mining 2177 Shilpa M.S Dept. of Computer Science Mohandas College of Engineering and Technology Anad,Trivandrum shilpams333@gmail.com Shalini.L Dept. of Computer Science Mohandas College
More informationApproximation Algorithms for k-anonymity 1
Journal of Privacy Technology 20051120001 Approximation Algorithms for k-anonymity 1 Gagan Aggarwal 2 Google Inc., Mountain View, CA Tomas Feder 268 Waverley St., Palo Alto, CA Krishnaram Kenthapadi 3
More informationResearch Paper SECURED UTILITY ENHANCEMENT IN MINING USING GENETIC ALGORITHM
Research Paper SECURED UTILITY ENHANCEMENT IN MINING USING GENETIC ALGORITHM 1 Dr.G.Kirubhakar and 2 Dr.C.Venkatesh Address for Correspondence 1 Department of Computer Science and Engineering, Surya Engineering
More informationMATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM
UDC 681.3.06 MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» E-mail: vk@ad.cctpu.edu.ru Matrix algorithm o solving graph cutting problem has been suggested.
More informationMy Health, My Data (and other related projects) Yannis Ioannidis ATHENA Research Center & University of Athens
My Health, My Data (and other related projects) Yannis Ioannidis ATHENA Research Center & University of Athens My Health, My Data! 1 / 11 / 2016-30 / 10 / 2019 ~3M ( ~420K for ARC) Age ParCHD Procedures
More informationPrivacy-Preserving Multi-Party Clustering: An Empirical Study
Privacy-Preserving Multi-Party Clustering: An Empirical Study Arlei Silva University of California Santa Barbara, CA arlei@cs.ucsb.edu Gowtham Bellala C3 IoT Redwood City, CA gowtham.bellala@c3iot.com
More informationA Review on Privacy Preserving Data Mining Approaches
A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana
More informationTHE FINANCIAL CALCULATOR
Starter Kit CHAPTER 3 Stalla Seminars THE FINANCIAL CALCULATOR In accordance with the AIMR calculator policy in eect at the time o this writing, CFA candidates are permitted to use one o two approved calculators
More informationMichelle Hayes Mary Joel Holin. Michael Roanhouse Julie Hovden. Special Thanks To. Disclaimer
Further Understanding the Intersection of Technology and Privacy to Ensure and Protect Client Data Special Thanks To Michelle Hayes Mary Joel Holin We can provably know where domestic violence shelter
More informationAN EFFECTIVE FRAMEWORK FOR EXTENDING PRIVACY- PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA
AN EFFECTIVE FRAMEWORK FOR EXTENDING PRIVACY- PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA Morla Dinesh 1, Shaik. Jumlesha 2 1 M.Tech (S.E), Audisankara College Of Engineering &Technology 2
More informationCS 161 Computer Security
Raluca Popa Spring 2018 CS 161 Computer Security Homework 2 Due: Wednesday, February 14, at 11:59pm Instructions. This homework is due Wednesday, February 14, at 11:59pm. No late homeworks will be accepted.
More informationA Theory of Privacy and Utility for Data Sources
A Theory of Privacy and Utility for Data Sources Lalitha Sankar Princeton University 7/26/2011 Lalitha Sankar (PU) Privacy and Utility 1 Electronic Data Repositories Technological leaps in information
More informationE-cash. Cryptography. Professor: Marius Zimand. e-cash. Benefits of cash: anonymous. difficult to copy. divisible (you can get change)
Cryptography E-cash Professor: Marius Zimand e-cash Benefits of cash: anonymous difficult to copy divisible (you can get change) easily transferable There are several protocols for e-cash. We will discuss
More informationIntegration of information security and network data mining technology in the era of big data
Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The
More informationEfficient k-anonymization Using Clustering Techniques
Efficient k-anonymization Using Clustering Techniques Ji-Won Byun 1,AshishKamra 2, Elisa Bertino 1, and Ninghui Li 1 1 CERIAS and Computer Science, Purdue University {byunj, bertino, ninghui}@cs.purdue.edu
More informationPrivacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
SUBMISSION TO IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms Jingyu Hua, An Tang,
More informationApproaches to distributed privacy protecting data mining
Approaches to distributed privacy protecting data mining Bartosz Przydatek CMU Approaches to distributed privacy protecting data mining p.1/11 Introduction Data Mining and Privacy Protection conflicting
More informationMore crypto and security
More crypto and security CSE 199, Projects/Research Individual enrollment Projects / research, individual or small group Implementation or theoretical Weekly one-on-one meetings, no lectures Course grade
More informationPRACTICAL K-ANONYMITY ON LARGE DATASETS. Benjamin Podgursky. Thesis. Submitted to the Faculty of the. Graduate School of Vanderbilt University
PRACTICAL K-ANONYMITY ON LARGE DATASETS By Benjamin Podgursky Thesis Submitted to the Faculty of the Graduate School of Vanderbilt University in partial fulfillment of the requirements for the degree of
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 12: Database Security Department of Computer Science and Engineering University at Buffalo 1 Review of Access Control Types We previously studied four types
More informationAn efficient hash-based algorithm for minimal k-anonymity
An efficient hash-based algorithm for minimal k-anonymity Xiaoxun Sun Min Li Hua Wang Ashley Plank Department of Mathematics & Computing University of Southern Queensland Toowoomba, Queensland 4350, Australia
More informationASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1
ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD 1 Recommended Book Steven Levy. Crypto. Penguin books. 2001. A non-technical account of the history of public-key cryptography and the colorful characters
More informationPseudonymization of Information for Privacy in E-Health (PIPE)
Pseudonymization of Information for Privacy in E-Health (PIPE) A Min Tjoa TU Wien & SBA One side of Privacy No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home,
More informationImproving Privacy And Data Utility For High- Dimensional Data By Using Anonymization Technique
Improving Privacy And Data Utility For High- Dimensional Data By Using Anonymization Technique P.Nithya 1, V.Karpagam 2 PG Scholar, Department of Software Engineering, Sri Ramakrishna Engineering College,
More informationAPPLICATIONS AND PROTOCOLS. Mihir Bellare UCSD 1
APPLICATIONS AND PROTOCOLS Mihir Bellare UCSD 1 Some applications and protocols Internet Casino Commitment Shared coin flips Threshold cryptography Forward security Program obfuscation Zero-knowledge Certified
More informationPrivacy Preserving Data Sanitization and Publishing. A. N. K. Zaman
Privacy Preserving Data Sanitization and Publishing by A. N. K. Zaman A Thesis presented to The University of Guelph In partial fulfillment of requirements for the degree of Doctor of Philosophy in Computer
More informationIntroduction to Privacy
Introduction to Privacy Why We Care? New Information Technologies: A) Digital storage, retrieval, distribution Enormous cost reductions B) Data sharing and processing i.e Data mining C) Ubiquitous Networking,
More information