78
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

The Effectiveness of Data Shuffling for Privacy-Preserving Data Mining Applications

Pages 3-17 | Published online: 07 Jul 2014

References

  • Berndt, E.R. (1991). The Practice of Econometrics, New York: Addison Wesley.
  • Burridge, J. (2003). Information preserving statistical obfuscation, Statistics and Computing, 13, 321–327.
  • Dalenius, T. & Reiss, S. P. (1982). Data-swapping: A technique for disclosure control. Journal of Statistical Planning and Inference, 6, 73–85.
  • Domingo-Ferrer, J, & Mateo-Sanz, J.M. (2002). Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering, 14, 189–201.
  • Domingo-Ferrer, J. & González-Nicolás, U. (2010). Hybrid data using microaggregation. Information Sciences, 180, 2834–2844.
  • Domingo-Ferrer, J. & Torra, V. (2001). A quantitative comparison of disclosure control methods for microdata. In P. Doyle, J. Lane, J. Theeuwes, & L. Zayatz, (Eds.), Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, North-Holland, Amsterdam, 111–134.
  • Domingo-Ferrer, J., Sebé, F., & Solanas, A. (2008). A polynomial-time approximation to optimal multivariate microaggregation. Computers & Mathematics with Applications, 2008, 714–32.
  • Du, W. L. & Atallah, M.J. (2001). Privacy-preserving cooperative statistical analysis. 17th Annual Computer Security Applications Conference Proceedings, New Orleans, Louisiana, 102–110.
  • Fuller, W.A. (1993). Masking procedures for microdata disclosure limitation. Journal of Official Statistics, 9, 383–406.
  • Galletta, D. (2004). MIS Faculty Salary Survey. http://www.pitt.edu/∼galletta/
  • Harrison, D. & Rubinfeld, D.L. (1978). Hedonic housing prices and the demand for clean air. Journal of Environmental Economics and Management, 5, 81–102.
  • Kargupta, K., Datta, S., Wang, Q., & Sivakumar, K. (2003). On the privacy preserving properties of random data perturbation techniques. IEEE International Conference on Data Mining, Melbourne, Florida, 99–106.
  • Karr, A.F., Lin, X.S., Sanil, A.P., & Reiter, J.P. (2009). Privacy-preserving analyses of vertically partitioned data using secure matrix product protocols. Journal of Official Statistics, 25, 125–138.
  • Li, X.-B. & Sarkar, S. (2006a). A tree-based data perturbation approach for privacy-preserving data mining. IEEE Transactions on Knowledge and Data Engineering, 18, 1278–1283.
  • Li, X.-B. & Sarkar, S. (2006b). Privacy protection in data mining: A perturbation approach for categorical data. Information Systems Research, 17, 254–270.
  • Liu, K., Kargupta, H. & Ryan, J. (2006). Random projection-based multiplicative data perturbation for privacy preserving distributed data dining. IEEE Transactions on Knowledge and Data Engineering, 18, 92–106.
  • Moore, R.A. (1996). Controlled data swapping for masking public use microdata sets. U.S. Census Bureau Research Report 96/04..
  • Muralidhar, K. & Sarathy, R. (2006). Data shuffling - A new masking approach for numerical data. Management Science, 52, 658–670.
  • Muralidhar, K. & Sarathy, R. (2008). Generating sufficiency-based non-synthetic perturbed data. Transactions on Data Privacy, 1, 17–33.
  • Muralidhar, K., Parsa, R. & Sarathy, R. (1999). A general additive data perturbation method for database security. Management Science, 45, 1399–1415.
  • Oganian, A. & Karr, A.F. (2006). Combinations of SDC methods for microdata protection. In Domingo-Ferrer J, Franconi L, (Eds.), Privacy in statistical databases, Springer, Berlin, 102–13.
  • Quinlan, J.R. (1993). C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers.
  • Rubin, D.B. (1993). Discussion of statistical disclosure limitation. Journal of Official Statistics, 9, 461–468.
  • Sarathy, R. & Muralidhar, K. (2002). The security of confidential numerical data in databases. Information Systems Research, 13, 389–403.
  • Sarathy, R., Muralidhar, K. & Parsa, R. (2002). Perturbing non-normal confidential attributes: The copula approach. Management Science, 48, 1613–1627.
  • Torgo, L. (1996). Housing Data. http://www.cs.waikato.ac.nz/ml/weka/
  • Trottini, M., Muralidhar, K. & Sarathy, R. (2011). Maintaining tail dependence in data shuffling using t copula. Statistics and Probability Letters, 81, 420–428.
  • Vaidya, J. & Clifton, C. (2002). Privacy preserving association rule mining in vertically partitioned data. Proceedings of the 8th ACM SIGKDD Int'l Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, 639–644.
  • Willenborg, L. & de Waal, T. (2001). Elements of Statistical Disclosure Control. New York: Springer.
  • Winkler, W. & Kim, J. (2003). Multiplicative noise for masking continuous data. U.S. Census Bureau Research Report 2003/01..

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.