Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
A security machanism for statistical database
ACM Transactions on Database Systems (TODS)
ACM Computing Surveys (CSUR)
A study on the protection of statistical data bases
SIGMOD '77 Proceedings of the 1977 ACM SIGMOD international conference on Management of data
Selective partial access to a database
ACM '76 Proceedings of the 1976 annual conference
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
A Privacy-Enhanced Microaggregation Method
FoIKS '02 Proceedings of the Second International Symposium on Foundations of Information and Knowledge Systems
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Journal of Computer and System Sciences - Special issue on PODS 2000
A theoretical basis for perturbation methods
Statistics and Computing
Random-data perturbation techniques and privacy-preserving data mining
Knowledge and Information Systems
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
IEEE Transactions on Knowledge and Data Engineering
Statistical versus relational join dependencies
SSDBM'1994 Proceedings of the 7th international conference on Scientific and Statistical Database Management
A general model for the answer-perturbation techniques
SSDBM'1994 Proceedings of the 7th international conference on Scientific and Statistical Database Management
On privacy preservation against adversarial data mining
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining
IEEE Transactions on Knowledge and Data Engineering
Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data
Information Systems Research
Data ShufflingA New Masking Approach for Numerical Data
Management Science
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
TFRP: An efficient microaggregation algorithm for statistical disclosure control
Journal of Systems and Software
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
On static and dynamic methods for condensation-based privacy-preserving data mining
ACM Transactions on Database Systems (TODS)
Random orthogonal matrix masking methodology for microdata release
International Journal of Information and Computer Security
Computational complexity of auditing finite attributes in statistical databases
Journal of Computer and System Sciences
A distributed approach to enabling privacy-preserving model-based classifier training
Knowledge and Information Systems
Temporal privacy in wireless sensor networks: Theory and practice
ACM Transactions on Sensor Networks (TOSN)
Reconstructing Data Perturbed by Random Projections When the Mixing Matrix Is Known
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
Quantile-based bootstrap methods to generate continuous synthetic data
Proceedings of the 2010 EDBT/ICDT Workshops
New paradigm of inference control with trusted computing
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
IEEE Transactions on Information Technology in Biomedicine
Privacy-aware regression modeling of participatory sensing data
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
COP: a step toward children online privacy
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Preventing range disclosure in k-anonymised data
Expert Systems with Applications: An International Journal
Checking anonymity levels for anonymized data
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Privacy preservation by independent component analysis and variance control
Proceedings of the 20th ACM international conference on Information and knowledge management
Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data
Information Systems Research
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Security of random output perturbation for statistical databases
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Class-Restricted Clustering and Microperturbation for Data Privacy
Management Science
Hi-index | 0.00 |
This paper introduces data distortion by probability distribution, a probability distortion that involves three steps. The first step is to identify the underlying density function of the original series and to estimate the parameters of this density function. The second step is to generate a series of data from the estimated density function. And the final step is to map and replace the generated series for the original one. Because it is replaced by the distorted data set, probability distortion guards the privacy of an individual belonging to the original data set. At the same time, the probability distorted series provides asymptotically the same statistical properties as those of the original series, since both are under the same distribution. Unlike conventional point distortion, probability distortion is difficult to compromise by repeated queries, and provides a maximum exposure for statistical analysis.