Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A survey: deriving private information from perturbed data

A survey: deriving private information from perturbed data Privacy-preserving data mining has attracted the attention of a large number of researchers. Many data perturbation methods have been proposed to ensure individual privacy. Such methods seem to be successful in providing privacy and accuracy. On one hand, different methods are utilized to preserve privacy. On the other hand, various data reconstruction approaches have been proposed to derive private information from perturbed data. Thus, many researchers have been conducting various studies about data reconstruction methods and the resilience of data perturbation schemes. In this survey, we focus on data reconstruction methods due to their importance in privacy-preserving data mining. We provide a detailed review of the data reconstruction methods and the data perturbation schemes attacked by different data reconstruction techniques. We merge our review with the evaluation metrics and the data sets used in current attack techniques. Finally, we pose some open questions to provide a better understanding of these approaches and to guide future study. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Artificial Intelligence Review Springer Journals

A survey: deriving private information from perturbed data

Loading next page...
 
/lp/springer-journals/a-survey-deriving-private-information-from-perturbed-data-zXgHYsqtUw

References (21)

Publisher
Springer Journals
Copyright
Copyright © 2015 by Springer Science+Business Media Dordrecht
Subject
Computer Science; Artificial Intelligence (incl. Robotics); Computer Science, general
ISSN
0269-2821
eISSN
1573-7462
DOI
10.1007/s10462-015-9439-5
Publisher site
See Article on Publisher Site

Abstract

Privacy-preserving data mining has attracted the attention of a large number of researchers. Many data perturbation methods have been proposed to ensure individual privacy. Such methods seem to be successful in providing privacy and accuracy. On one hand, different methods are utilized to preserve privacy. On the other hand, various data reconstruction approaches have been proposed to derive private information from perturbed data. Thus, many researchers have been conducting various studies about data reconstruction methods and the resilience of data perturbation schemes. In this survey, we focus on data reconstruction methods due to their importance in privacy-preserving data mining. We provide a detailed review of the data reconstruction methods and the data perturbation schemes attacked by different data reconstruction techniques. We merge our review with the evaluation metrics and the data sets used in current attack techniques. Finally, we pose some open questions to provide a better understanding of these approaches and to guide future study.

Journal

Artificial Intelligence ReviewSpringer Journals

Published: Sep 14, 2015

There are no references for this article.