TY - GEN
T1 - Privacy vulnerabilities with background information in data perturbation
AU - Liu, Lian
AU - Wang, Jie
AU - Zhang, Jun
PY - 2009
Y1 - 2009
N2 - The issue of data privacy is considered a significant hindrance to the development and industrial applications of database publishing and data mining techniques. Among many privacy-preserving methodologies, data perturbation is a popular technique for achieving a balance between data utility and information privacy. It is known that the attacker's background information about the original data can play a significant role in breaching data privacy. In this paper, we analyze data perturbation's potential privacy vulnerability in the presence of known background information in privacy-preserving database publishing and data mining based on the eigenspace of the perturbed data under some constraints. We study the situation in which data privacy may be compromised with the leakage of a few original data records. We first show that additive perturbation preserves the angle between data records during the perturbation. Based on this angle-preservation property, we show that, in a general perturbation model, even the leakage of only one single original data probably degrades the privacy of perturbed data in some cases. We theoretically and experimentally show that a general data perturbation model is vulnerable from this type of background privacy breach.
AB - The issue of data privacy is considered a significant hindrance to the development and industrial applications of database publishing and data mining techniques. Among many privacy-preserving methodologies, data perturbation is a popular technique for achieving a balance between data utility and information privacy. It is known that the attacker's background information about the original data can play a significant role in breaching data privacy. In this paper, we analyze data perturbation's potential privacy vulnerability in the presence of known background information in privacy-preserving database publishing and data mining based on the eigenspace of the perturbed data under some constraints. We study the situation in which data privacy may be compromised with the leakage of a few original data records. We first show that additive perturbation preserves the angle between data records during the perturbation. Based on this angle-preservation property, we show that, in a general perturbation model, even the leakage of only one single original data probably degrades the privacy of perturbed data in some cases. We theoretically and experimentally show that a general data perturbation model is vulnerable from this type of background privacy breach.
UR - http://www.scopus.com/inward/record.url?scp=73449105105&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=73449105105&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:73449105105
SN - 9781615671090
T3 - Society for Industrial and Applied Mathematics - 9th SIAM International Conference on Data Mining 2009, Proceedings in Applied Mathematics
SP - 1268
EP - 1277
BT - Society for Industrial and Applied Mathematics - 9th SIAM International Conference on Data Mining 2009, Proceedings in Applied Mathematics 133
T2 - 9th SIAM International Conference on Data Mining 2009, SDM 2009
Y2 - 30 April 2009 through 2 May 2009
ER -