Privacy vulnerabilities with background information in data perturbation

Lian Liu, Jie Wang, Jun Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The issue of data privacy is considered a significant hindrance to the development and industrial applications of database publishing and data mining techniques. Among many privacy-preserving methodologies, data perturbation is a popular technique for achieving a balance between data utility and information privacy. It is known that the attacker's background information about the original data can play a significant role in breaching data privacy. In this paper, we analyze data perturbation's potential privacy vulnerability in the presence of known background information in privacy-preserving database publishing and data mining based on the eigenspace of the perturbed data under some constraints. We study the situation in which data privacy may be compromised with the leakage of a few original data records. We first show that additive perturbation preserves the angle between data records during the perturbation. Based on this angle-preservation property, we show that, in a general perturbation model, even the leakage of only one single original data probably degrades the privacy of perturbed data in some cases. We theoretically and experimentally show that a general data perturbation model is vulnerable from this type of background privacy breach.

Original languageEnglish
Title of host publicationSociety for Industrial and Applied Mathematics - 9th SIAM International Conference on Data Mining 2009, Proceedings in Applied Mathematics 133
Pages1268-1277
Number of pages10
StatePublished - 2009
Event9th SIAM International Conference on Data Mining 2009, SDM 2009 - Sparks, NV, United States
Duration: Apr 30 2009May 2 2009

Publication series

NameSociety for Industrial and Applied Mathematics - 9th SIAM International Conference on Data Mining 2009, Proceedings in Applied Mathematics
Volume3

Conference

Conference9th SIAM International Conference on Data Mining 2009, SDM 2009
Country/TerritoryUnited States
CitySparks, NV
Period4/30/095/2/09

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Software
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Privacy vulnerabilities with background information in data perturbation'. Together they form a unique fingerprint.

Cite this