A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods

  • Liu K
  • Giannella C
  • Kargupta H
N/ACitations
Citations of this article
65Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We focus primarily on the use of additive and matrix multiplicative data perturbation techniques in privacy preserving data mining (PPDM). We survey a recent body of research aimed at better understanding the vulnerabilities of these techniques. These researchers assumed the role of an attacker and developed methods for estimating the original data from the perturbed data and any available prior knowledge. Finally, we briefly discuss research aimed at attacking k -anonymization, another data perturbation technique in PPDM.

Cite

CITATION STYLE

APA

Liu, K., Giannella, C., & Kargupta, H. (2008). A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods (pp. 359–381). https://doi.org/10.1007/978-0-387-70992-5_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free