Data Security Using Decomposition
نویسندگان
چکیده
Protection of privacy from unauthorized access is one of the primary concerns in data use, from national security to business transactions. It brings out a new branch of data mining, known as Privacy Preserving Data Mining (PPDM). Privacy-Preserving is a major concern in the application of data mining techniques to datasets containing personal, sensitive, or confidential information. Data distortion is a critical component to preserve privacy in security-related data mining applications; we propose a QR Decomposition method for data distortion. We focus primarily on privacy preserving data clustering. As the distorted data occupies small amount of storage space, the memory requirement becomes low. Finally, we evaluate the effectiveness of the method in terms of misclassification error rate. Our experiments on several data sets reveal that the classification error rate varies as a result of security. However, the method has much less computational cost, especially when new data items are inserted dynamically.
منابع مشابه
DFRFT based on the eigen decomposition of the DFT matrix, a DFRFT with one fractional parameter was defined by taking fractional eigen value powers of an eigen decomposition of the DFT matrix. The DFT eigenvectors
886 Abstract— Growing with the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. The security system based on the fractional Fourier transform (FRFT) is protected by only a certain order...
متن کاملData Security Using Robust Techniques of Singular Value Decomposition in Blind Video Watermarking
This is a conceptual presentation of video watermarking technique using SVD transform. SVD is sufficient and the most optimal in a given image. It is packed with energy in a given number of transformation coefficients are maximized and is easy to calculate. A method of watermarking embedding and extraction is used in this paper. Investigation of the video using SVD will give good results. The o...
متن کاملSecure Logical Schema and Decomposition Algorithm for Proactive Context Dependent Attribute Based Access Control
Traditional database access control mechanisms use role based methods, with generally row based and attribute based constraints for granularity, and privacy is achieved mainly by using views. However if only a set of views according to policy are made accessible to users, then this set should be checked against the policy for the whole probable query history. The aim of this work is to define a...
متن کاملEnsuring Security to the Compressed Sensing Data Using a Steganographic Approach
ISSN 2277 – 503X | © 2013 Bonfring Abstract--This paper focuses on the strength of combining cryptography and steganography methods to enhance the security of communication over an open channel. Here the data to be send are secured by using the compressive sensing method and the Singular Value Decomposition (SVD) based embedding method. The data is encrypted using the compressive measurements o...
متن کاملPrivacy Preserving Clustering on Distorted data
In designing various security and privacy related data mining applications, privacy preserving has become a major concern. Protecting sensitive or confidential information in data mining is an important long term goal. An increased data disclosure risks may encounter when it is released. Various data distortion techniques are widely used to protect sensitive data; these approaches protect data ...
متن کامل