Reconstruction of Perturbed Data using K-Means
Journal Title: International Journal of Computational Engineering and Management IJCEM - Year 2012, Vol 15, Issue 6
Abstract
A key element in preserving privacy and confidentiality of sensitive data is the ability to evaluate the extent of all potential disclosure for such data. In other words, we need to be able to answer to what extent confidential information in a perturbed database can be compromised by attackers or snoopers. Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly modifying the data values using some additive noise and aim to reconstruct the original distribution closely at an aggregate level. The main contribution of this paper lies in the algorithm to accurately reconstruct the community joint density given the perturbed multidimensional stream data information. Any statistical question about the community can be answered using the reconstructed joint density. There have been many efforts on the community distribution reconstruction. Our research objective is to determine whether the distributions of the original and recovered data are close enough to each other despite the nature of the noise applied. We are considering an ensemble clustering method to reconstruct the initial data distribution. As the tool for the algorithm implementations we chose the “language of choice in industrial world” – MATLAB.
Authors and Affiliations
Prasannta Tiwari, Hitesh Gupta
QTL Identification in Presence of QTL×Environment Interaction
Quantitative traits are the traits controlled by many genes and each of the genes has a small effect on the trait. The loci controlling quantitative traits are referred to as QTLs (Quantitative Trait Loci) and the proced...
Implementation of License Plate Recognition System in ARM Cortex A8 Board
Automatic License Plate Recognition (ALPR) is a computer system which automatically recognizes the license plate from the digital image ie. from captured image of vehicle. This system involves various processes such as I...
Offline Signature Verification Using Neural Network
Even today an increasing number of transactions, especially financial, are being authorized via signatures, hence methods of automatic signature verification must be developed if authenticity is to be verified on a regul...
Design and Analysis of a Connected E-Shape and U-Shape Dual-Band Patch Antenna for WLAN Application
This paper represents a numerical simulation of connected E-shape and U-shape for WLAN application. In this paper, dual operation E-shape and U-shape Patch Antenna is fed by transmission line. The objective in this desig...
Relationship Between Stress and Quality of Worklife of School Teachers Based on Demographic Variables
The aim of this study is to investigate the differences in stress and QWL based on demographic variables such as gender, experience and the organization type. Questionnaire data was collected through simple random sampli...