A Survey Of Attack Techniques On Privacy-Preserving Data Perturbation Methods

PRIVACY-PRESERVING DATA MINING: MODELS AND ALGORITHMS(2008)

引用 49|浏览44
暂无评分
摘要
We focus primarily on the use of additive and matrix multiplicative data perturbation techniques in privacy preserving data mining (PPDM). We survey a recent body of research aimed at better understanding the vulnerabilities of these techniques. These researchers assumed the role of an attacker and developed methods for estimating the original data from the perturbed data and any available prior knowledge. Finally, we briefly discuss research aimed at attacking k-anonymization, another data perturbation technique in PPDM.
更多
查看译文
关键词
Data perturbation,additive noise,matrix multiplicative noise,attack techniques,k-anonymity
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要