Privacy Preservation for Distance and Correlation-based Mining Algorithms
碩士 === 國立臺灣大學 === 電信工程學研究所 === 97 === This paper devises a transformation scheme to protect data privacy in the case that data has to be sent to the third party for analysis purpose. Most conventional transformation schemes suffer from two limits, i.e. algorithm dependency and information loss. In t...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/47900553480717301081 |
id |
ndltd-TW-097NTU05435072 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097NTU054350722016-05-02T04:11:09Z http://ndltd.ncl.edu.tw/handle/47900553480717301081 Privacy Preservation for Distance and Correlation-based Mining Algorithms 距離及相關性資料探勘演算法的隱私權保護 Chun-Wei Su 蘇俊維 碩士 國立臺灣大學 電信工程學研究所 97 This paper devises a transformation scheme to protect data privacy in the case that data has to be sent to the third party for analysis purpose. Most conventional transformation schemes suffer from two limits, i.e. algorithm dependency and information loss. In this paper, we propose a novel privacy preserving scheme without these two limitations. This transformation algorithm is referred to as FISIP: FIrst and Second order sum and Inner product Preservation. Explicitly, as will be proved, by preserving three basic properties, (i.e. first order sum, second sum, and inner products) of private data, algorithms whose measures can be derived from the three properties can still be applied to public data transformed by FISIP. Specifically, distance and correlation can be derived from the three properties. Hence, distance-based algorithms and correlation-based algorithms can be applied. Evaluation of FISIP is done in two parts. The first part is data usefulness. The second part is data robustness. The two goals are intrinsically difficult to achieve at the same time. However, FISIP attains these two goals shown by our experimental results later. In all, FISIP is able to provide a transformation that preserves the distance and the correlation for the original private data after their transformation to the public data. As a result, while the privacy is protected, the mining quality from the transformed (public) data can be obtained to be the same as that from the original (private) data. 陳銘憲 2009 學位論文 ; thesis 34 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 電信工程學研究所 === 97 === This paper devises a transformation scheme to protect data privacy in the case that data has to be sent to the third party for analysis purpose. Most conventional transformation schemes suffer from two limits, i.e. algorithm dependency and information loss. In this paper, we propose a novel privacy preserving scheme without these two limitations. This transformation algorithm is referred to as FISIP: FIrst and Second order sum and Inner product Preservation. Explicitly, as will be proved, by preserving three basic properties, (i.e. first order sum, second sum, and inner products) of private data, algorithms whose measures can be derived from the three properties can still be applied to public data transformed by FISIP. Specifically, distance and correlation can be derived from the three properties. Hence, distance-based algorithms and correlation-based algorithms can be applied. Evaluation of FISIP is done in two parts. The first part is data usefulness. The second part is data robustness. The two goals are intrinsically difficult to achieve at the same time. However, FISIP attains these two goals shown by our experimental results later. In all, FISIP is able to provide a transformation that preserves the distance and the correlation for the original private data after their transformation to the public data. As a result, while the privacy is protected, the mining quality from the transformed (public) data can be obtained to be the same as that from the original (private) data.
|
author2 |
陳銘憲 |
author_facet |
陳銘憲 Chun-Wei Su 蘇俊維 |
author |
Chun-Wei Su 蘇俊維 |
spellingShingle |
Chun-Wei Su 蘇俊維 Privacy Preservation for Distance and Correlation-based Mining Algorithms |
author_sort |
Chun-Wei Su |
title |
Privacy Preservation for Distance and Correlation-based Mining Algorithms |
title_short |
Privacy Preservation for Distance and Correlation-based Mining Algorithms |
title_full |
Privacy Preservation for Distance and Correlation-based Mining Algorithms |
title_fullStr |
Privacy Preservation for Distance and Correlation-based Mining Algorithms |
title_full_unstemmed |
Privacy Preservation for Distance and Correlation-based Mining Algorithms |
title_sort |
privacy preservation for distance and correlation-based mining algorithms |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/47900553480717301081 |
work_keys_str_mv |
AT chunweisu privacypreservationfordistanceandcorrelationbasedminingalgorithms AT sūjùnwéi privacypreservationfordistanceandcorrelationbasedminingalgorithms AT chunweisu jùlíjíxiāngguānxìngzīliàotànkānyǎnsuànfǎdeyǐnsīquánbǎohù AT sūjùnwéi jùlíjíxiāngguānxìngzīliàotànkānyǎnsuànfǎdeyǐnsīquánbǎohù |
_version_ |
1718253239126720512 |