Reconstruction of Perturbed Data using K-Means
Journal Title: International Journal of Computational Engineering and Management IJCEM - Year 2012, Vol 15, Issue 6
Abstract
A key element in preserving privacy and confidentiality of sensitive data is the ability to evaluate the extent of all potential disclosure for such data. In other words, we need to be able to answer to what extent confidential information in a perturbed database can be compromised by attackers or snoopers. Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly modifying the data values using some additive noise and aim to reconstruct the original distribution closely at an aggregate level. The main contribution of this paper lies in the algorithm to accurately reconstruct the community joint density given the perturbed multidimensional stream data information. Any statistical question about the community can be answered using the reconstructed joint density. There have been many efforts on the community distribution reconstruction. Our research objective is to determine whether the distributions of the original and recovered data are close enough to each other despite the nature of the noise applied. We are considering an ensemble clustering method to reconstruct the initial data distribution. As the tool for the algorithm implementations we chose the “language of choice in industrial world” – MATLAB.
Authors and Affiliations
Prasannta Tiwari, Hitesh Gupta
Permuted Diagonal Maximum Weight Matching (PDMWM) Scheme for Cell Scheduling in Fixed Length Packet Switches
Explosive growth in internet is demanding very fast switching fabric in internet routers and switches. Packets need to be buffered at input or output or on both sides of crossbar switching fabric. Crossbar switches are u...
Cloud Computing Testing Evaluation
Testing becomes an important process in software development not only in terms of exposure but also in terms of performance, usability, safety, security, reusability. Also software testing is an essential activity to sof...
Texture Analysis of Thyroid Ultrasound Images for Diagnosis of Benign and Malignant Nodule using Scaled Conjugate Gradient Backpropagation Training Neural Network
A thyroid is largest endocrine gland, a butterfly shape with two lobes which produces hormones that control body metabolism. The nodules are found in thyroid may be benign or malignant. The ultrasound (US) preferred over...
Impact of Intellectual Capital Disclosure on Market Cap
The study aims to empirically investigate, the impact of Intellectual capital (IC) on financial aspects of the organizational performance and on market capitalization. The study also aims to develop a descriptive framewo...
Study of Nonlinearity in CO-OFDM for Single Channel and WDM System
In this paper an attempt is made to study the theoretical fundamentals for Coherent optical orthogonal frequency division multiplexing (CO-OFDM) for high speed, long haul optical transmission and investigated the nonline...