We focus primarily on the use of additive and matrix multiplicative data perturbation techniques in privacy preserving data mining (PPDM). We survey a recent body of research aimed at better understanding the vulnerabilities of these techniques. These researchers assumed the role of an attacker and developed methods for estimating the original data from the perturbed data and any available prior knowledge. Finally, we briefly discuss research aimed at attacking k -anonymization, another data perturbation technique in PPDM.
CITATION STYLE
Liu, K., Giannella, C., & Kargupta, H. (2008). A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods (pp. 359–381). https://doi.org/10.1007/978-0-387-70992-5_15
Mendeley helps you to discover research relevant for your work.