频谱滤波在保护隐私数据挖掘中的应用

Songtao Guo, Xintao Wu
{"title":"频谱滤波在保护隐私数据挖掘中的应用","authors":"Songtao Guo, Xintao Wu","doi":"10.1145/1141277.1141418","DOIUrl":null,"url":null,"abstract":"Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining. The previous work based on spectral filtering, show the noise may be separated from the perturbed data under some conditions and as a result privacy can be seriously compromised. In this paper, we explicitly assess the effects of perturbation on the accuracy of the estimated value and give the explicit relation on how the estimation error varies with perturbation. In particular, we derive one upper bound for the Frobenius norm of reconstruction error. This upper bound may be exploited by attackers to determine how close their estimates are from the original data using spectral filtering technique, which imposes a serious threat of privacy breaches.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":"{\"title\":\"On the use of spectral filtering for privacy preserving data mining\",\"authors\":\"Songtao Guo, Xintao Wu\",\"doi\":\"10.1145/1141277.1141418\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining. The previous work based on spectral filtering, show the noise may be separated from the perturbed data under some conditions and as a result privacy can be seriously compromised. In this paper, we explicitly assess the effects of perturbation on the accuracy of the estimated value and give the explicit relation on how the estimation error varies with perturbation. In particular, we derive one upper bound for the Frobenius norm of reconstruction error. This upper bound may be exploited by attackers to determine how close their estimates are from the original data using spectral filtering technique, which imposes a serious threat of privacy breaches.\",\"PeriodicalId\":269830,\"journal\":{\"name\":\"Proceedings of the 2006 ACM symposium on Applied computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"28\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2006 ACM symposium on Applied computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1141277.1141418\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2006 ACM symposium on Applied computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1141277.1141418","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28

摘要

在保护隐私的数据挖掘中,随机化是隐藏敏感隐私信息的主要工具。以往基于频谱滤波的研究表明,在某些条件下,噪声可能会从扰动数据中分离出来,从而严重损害隐私。本文明确地评估了摄动对估计精度的影响,并给出了估计误差随摄动的显式变化关系。特别地,我们导出了重构误差的Frobenius范数的一个上界。攻击者可以利用这个上限来确定他们的估计与原始数据使用频谱滤波技术的接近程度,这对隐私泄露造成了严重的威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
On the use of spectral filtering for privacy preserving data mining
Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining. The previous work based on spectral filtering, show the noise may be separated from the perturbed data under some conditions and as a result privacy can be seriously compromised. In this paper, we explicitly assess the effects of perturbation on the accuracy of the estimated value and give the explicit relation on how the estimation error varies with perturbation. In particular, we derive one upper bound for the Frobenius norm of reconstruction error. This upper bound may be exploited by attackers to determine how close their estimates are from the original data using spectral filtering technique, which imposes a serious threat of privacy breaches.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
File system framework for organizing sensor networks Editorial message: special track on operating systems and adaptive applications Simplifying transformation of software architecture constraints Session details: Software engineering: sound solutions for the 21st century To infinity and beyond or, avoiding the infinite in security protocol analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1