Visible to the public A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining

TitleA Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining
Publication TypeConference Paper
Year of Publication2019
AuthorsMo, Ran, Liu, Jianfeng, Yu, Wentao, Jiang, Fu, Gu, Xin, Zhao, Xiaoshuai, Liu, Weirong, Peng, Jun
Conference Name2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Date Publishedaug
Keywordsadaptive mechanism, adaptive privacy budget parameter adjustment mechanism, big data mining, big data privacy, Clustering algorithms, composability, data distortion technique, data mining, Data preprocessing, data privacy, Differential privacy, differential privacy budget parameter, differential privacy-based protecting data preprocessing method, distance-based clustering, distancebased clustering, distortion, Human Behavior, human factors, Metrics, pattern clustering, precise clustering results, privacy, privacy disclosure issue, privacy protection, pubcrawl, resilience, Resiliency, Scalability
Abstract

Analyzing clustering results may lead to the privacy disclosure issue in big data mining. In this paper, we put forward a differential privacy-based protecting data preprocessing method for distance-based clustering. Firstly, the data distortion technique differential privacy is used to prevent the distances in distance-based clustering from disclosing the relationships. Differential privacy may affect the clustering results while protecting privacy. Then an adaptive privacy budget parameter adjustment mechanism is applied for keeping the balance between the privacy protection and the clustering results. By solving the maximum and minimum problems, the differential privacy budget parameter can be obtained for different clustering algorithms. Finally, we conduct extensive experiments to evaluate the performance of our proposed method. The results demonstrate that our method can provide privacy protection with precise clustering results.

DOI10.1109/TrustCom/BigDataSE.2019.00098
Citation Keymo_differential_2019