Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1827
Title: Privacy Preserving Clustering by Cluster Bulging for Information Sustenance
Authors: Kadampur, Mohammad Ali
Somayajulu, D.V.L.N
Dhiraj, S.S.Shivaji
Satyam, Shailesh G.P.
Keywords: Data perturbation
Cluster analysis
Issue Date: 2008
Publisher: Proceedings of the 2008 4th International Conference on Information and Automation for Sustainability, ICIAFS 2008
Citation: 10.1109/ICIAFS.2008.4783947
Abstract: Cluster analysis is a data mining approach for unsupervised learning. However, the use of clustering as a data mining tool has been a cause of growing concern as the use of this technology is violating individual privacy. This paper presents a method for privacy preserving clustering through cluster bulging. In this method, the objects of the database are first aligned into clusters based on a similarity measure. The data in these clusters is perturbed in a controlled manner by modifying the values of various objects, so that, in the perturbed data set, the clusters are bulged in comparison to those in the original data set. In order to perform this perturbation, every cluster is displaced along the line joining its centroid to the centroid of the whole data set. And, then, every object in each cluster is shifted along the line joining that object to the centroid of the cluster. The word bulging used here refers to both positive and negative bulging. The method in essence manipulates the similarity measures and recomputes the new perturbed objects of the respective clusters. Thus, every object in the bulged cluster represents its corresponding object from the original cluster. After the application of this method, the objects get perturbed, while the number of member objects and shape of each cluster remain the same as those of the original clusters, thereby the information in the two instances of the data sets is sustained, while, the privacy of sensitive data is preserved. The perturbed data obtained in this method is still relevant for cluster analysis.
Description: NITW
URI: http://localhost:8080/xmlui/handle/123456789/1827
Appears in Collections:Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
Privacy_Preserving_Clustering_by_Cluster_Bulging_for_Information_Sustenance (2).pdf234.2 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.