Data Distortion for Privacy Protection in a Terrorist Analysis System (original) (raw)
Abstract
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data mining-based terrorist analysis systems. We propose a sparsified Singular Value Decomposition (SVD) method for data distortion. We also put forth a few metrics to measure the difference between the distorted dataset and the original dataset. Our experimental results using synthetic and real world datasets show that the sparsified SVD method works well in preserving privacy as well as maintaining utility of the datasets.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
- Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, California, USA (2001)
Google Scholar - Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD, Dallas, Texas (2000)
Google Scholar - Deewester, S., Dumais, S., et al.: Indexing by latent semantic analysis. J. Amer. Soc. Infor. Sci. 41, 391–407 (1990)
Article Google Scholar - Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of PODS 2003, San Diego, CA (June 2003)
Google Scholar - Gao, J., Zhang, J.: Sparsification strategies in latent semantic indexing. In: Proceedings of the 2003 Text Mining Workshop, San Francisco, CA, pp. 93–103 (2003)
Google Scholar - Skillicorn, D.B.: Clusters within clusters: SVD and counterterrorism. In: Proceedings of 2003 Workshop on Data Mining for Counter Terrorism and Security, San Francisco, CA, May 3, 12 p. (2003)
Google Scholar - Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10, 557–570 (2002)
Article MATH MathSciNet Google Scholar - http://www.trackingthethreat.com
- Vapnik, V.N.: Statistical Learning Theory. John Wiley & Sons, New York (1998)
MATH Google Scholar
Author information
Authors and Affiliations
- Department of Computer Science, University of Kentucky, Lexington, KY, 40506-0046, USA
Shuting Xu, Jun Zhang, Dianwei Han & Jie Wang
Authors
- Shuting Xu
- Jun Zhang
- Dianwei Han
- Jie Wang
Editor information
Editors and Affiliations
- Department of Library and Information Science, Rutgers University,
Paul Kantor - School of Communication, Information and Library Studies, Rutgers University, 4 Huntington Street, 08901-1071, New Brunswick, NJ, USA
Gheorghe Muresan - Artificial Solutions, Altonaer Poststraße 13b, 22767, Hamburg, Germany
Fred Roberts - MIS Department, University of Arizona, 85721, Tucson, AZ, USA
Daniel D. Zeng - Institute of Automation, Chinese Academy of Sciences, Beijing, China
Fei-Yue Wang - Department of Management Information Systems, Eller College of Management, The University of Arizona, 85721, AZ, USA
Hsinchun Chen - College of Computing, Georgia Tech Information Security Center, Georgia Institute of Technology, 801 Atlantic Drive, 30332-0280, Atlanta, GA, USA
Ralph C. Merkle
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xu, S., Zhang, J., Han, D., Wang, J. (2005). Data Distortion for Privacy Protection in a Terrorist Analysis System. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995\_43
Download citation
- .RIS
- .ENW
- .BIB
- DOI: https://doi.org/10.1007/11427995\_43
- Publisher Name: Springer, Berlin, Heidelberg
- Print ISBN: 978-3-540-25999-2
- Online ISBN: 978-3-540-32063-0
- eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science