• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ni Weiwei, Chen Geng, Chong Zhihong, Wu Yingjie. Privacy-Preserving Data Publication for Clustering[J]. Journal of Computer Research and Development, 2012, 49(5): 1095-1104.
Citation: Ni Weiwei, Chen Geng, Chong Zhihong, Wu Yingjie. Privacy-Preserving Data Publication for Clustering[J]. Journal of Computer Research and Development, 2012, 49(5): 1095-1104.

Privacy-Preserving Data Publication for Clustering

More Information
  • Published Date: May 14, 2012
  • Privacy-preserving data publication has attracted sustained attention in recent years. It seeks a trade-off between preserving data privacy and maintaining data utility. Clustering is a crucial step for advanced data analysis, which has been widely studied in data mining. There exists some inconsistency between clustering and data obfuscation. Process of clustering heavily depends on characteristics of individual records to segment data into different clusters. On the contrary, the process of data obfuscation usually adopts the idea of suppressing individual characteristics for the sake of avoiding leakage of individual privacy. It becomes difficult to accommodate data privacy and clustering utility of the published data simultaneously. Various distortion and limited distribution techniques are delved into this problem. The state-of-the-art of data obfuscation methods for clustering application is surveyed. The constraint mechanism among clustering character granularities to be kept, clustering usability maintenance and security of data privacy is discussed. Further, the principles and merits of some prevalent methods, such as data anonymity, data randomization, data swapping and synthetic data substitution, are compared from a view of accommodating data privacy preservation and clustering usability maintenance. Following a comprehensive analysis of the existing techniques, some unaddressed problems and future directions are highlighted.
  • Related Articles

    [1]Zhang Qiang, Ye Ayong, Ye Guohua, Deng Huina, Chen Aimin. k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering[J]. Journal of Computer Research and Development, 2022, 59(7): 1625-1635. DOI: 10.7544/issn1000-1239.20210117
    [2]Chen Yewang, Shen Lianlian, Zhong Caiming, Wang Tian, Chen Yi, Du Jixiang. Survey on Density Peak Clustering Algorithm[J]. Journal of Computer Research and Development, 2020, 57(2): 378-394. DOI: 10.7544/issn1000-1239.2020.20190104
    [3]Hong Min, Jia Caiyan, Li Yafang, Yu Jian. Sample-Weighted Multi-View Clustering[J]. Journal of Computer Research and Development, 2019, 56(8): 1677-1685. DOI: 10.7544/issn1000-1239.2019.20190150
    [4]Leng Biao, Zhao Wenyuan. Region Ridership Characteristic Clustering Using Passenger Flow Data[J]. Journal of Computer Research and Development, 2014, 51(12): 2653-2662. DOI: 10.7544/issn1000-1239.2014.20131124
    [5]Wu Yingjie, Tang Qingming, Ni Weiwei, Sun Zhihui, Liao Shangbin. A Clustering Hybrid Based Algorithm for Privacy Preserving Trajectory Data Publishing[J]. Journal of Computer Research and Development, 2013, 50(3): 578-593.
    [6]Hu Xinping, He Yuzhi, Ni Weiwei, and Zhang Yong. A Privacy-Preserving Data Publishing Method Based on Genetic Algorithm with Roulette Wheel[J]. Journal of Computer Research and Development, 2012, 49(11): 2432-2439.
    [7]Xiong Ping, Zhu Tianqing. A Data Anonymization Approach Based on Impurity Gain and Hierarchical Clustering[J]. Journal of Computer Research and Development, 2012, 49(7): 1545-1552.
    [8]Chong Zhihong, Ni Weiwei, Liu Tengteng, and Zhang Yong. A Privacy-Preserving Data Publishing Algorithm for Clustering Application[J]. Journal of Computer Research and Development, 2010, 47(12).
    [9]Ni Weiwei, Xu Lizhen, Chong Zhihong, Wu Yingjie, Liu Tengteng, and Sun Zhihui. A Privacy-Preserving Data Perturbation Algorithm Based on Neighborhood Entropy[J]. Journal of Computer Research and Development, 2009, 46(3): 498-504.
    [10]Xie Kunwu, Bi Xiaoling, and Ye Bin. Clustering Algorithm of High-Dimensional Data Based on Units[J]. Journal of Computer Research and Development, 2007, 44(9): 1618-1623.

Catalog

    Article views (958) PDF downloads (582) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return