Data Distortion for Privacy Protection in a Terrorist Analysis System

Shuting Xu, Jun Zhang, Dianwei Han, and Jie Wang
Laboratory for High Performance Scientific Computing and Computer Simulation
Department of Computer Science
University of Kentucky
Lexington, KY 40506-0046, USA

Abstract

Privacy-preserving is a major concern in the application of data mining techniques to datasets containing personal, sensitive, or confidential information. Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data mining-based terrorist analysis systems. We propose a sparsified Singular Value Decomposition (SVD) method for data distortion. We also put forth a few metrics to measure the difference between the distorted dataset and the original dataset and the degree of the privacy protection. Our experimental results using synthetic and real world datasets show that the sparsified SVD method works well in preserving privacy as well as maintaining utility of the datasets.


Key words: Privacy protection, counterterrorism singular value decomposition

Mathematics Subject Classification:


Download the compressed postscript file xu6.ps.gz, or the PDF file xu6.pdf.
This paper has been published in the Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, P. Kantor et al. (Eds.), ISI 2005, LNCS 3495, Springer-Verlag, Berlin, pp. 459-464, Atlanta, GA, May 2005.

Technical Report 432-05, Department of Computer Science, University of Kentucky, Lexington, KY, 2004.

The research work was supported in part by the Kentucky New Economy Safety and Security (NESSI) Consortium.