Skip to main content
Erschienen in: Journal of Medical Systems 10/2015

01.10.2015 | Transactional Processing Systems

A Novel Anti-classification Approach for Knowledge Protection

verfasst von: Chen-Yi Lin, Tung-Shou Chen, Hui-Fang Tsai, Wei-Bin Lee, Tien-Yu Hsu, Yuan-Hung Kao

Erschienen in: Journal of Medical Systems | Ausgabe 10/2015

Einloggen, um Zugang zu erhalten

Abstract

Classification is the problem of identifying a set of categories where new data belong, on the basis of a set of training data whose category membership is known. Its application is wide-spread, such as the medical science domain. The issue of the classification knowledge protection has been paid attention increasingly in recent years because of the popularity of cloud environments. In the paper, we propose a Shaking Sorted-Sampling (triple-S) algorithm for protecting the classification knowledge of a dataset. The triple-S algorithm sorts the data of an original dataset according to the projection results of the principal components analysis so that the features of the adjacent data are similar. Then, we generate noise data with incorrect classes and add those data to the original dataset. In addition, we develop an effective positioning strategy, determining the added positions of noise data in the original dataset, to ensure the restoration of the original dataset after removing those noise data. The experimental results show that the disturbance effect of the triple-S algorithm on the CLC, MySVM, and LibSVM classifiers increases when the noise data ratio increases. In addition, compared with existing methods, the disturbance effect of the triple-S algorithm is more significant on MySVM and LibSVM when a certain amount of the noise data added to the original dataset is reached.
Literatur
1.
Zurück zum Zitat Aggarwal, A., Rani, R., and Dhir, R., Recognition of devanagari handwritten numerals using gradient features and SVM. Int. J. Comput. Appl. 48(8):39–44, 2012. doi:10.5120/7371-0151. Aggarwal, A., Rani, R., and Dhir, R., Recognition of devanagari handwritten numerals using gradient features and SVM. Int. J. Comput. Appl. 48(8):39–44, 2012. doi:10.​5120/​7371-0151.
3.
Zurück zum Zitat Martens, D., Baesens, B., and Gestel, T. V., Decompositional rule extraction from support vector machines by active learning. IEEE Trans. Knowl. Data Eng 21(2):178–191, 2009. doi:10.1109/TKDE.2008.131.CrossRef Martens, D., Baesens, B., and Gestel, T. V., Decompositional rule extraction from support vector machines by active learning. IEEE Trans. Knowl. Data Eng 21(2):178–191, 2009. doi:10.​1109/​TKDE.​2008.​131.CrossRef
6.
Zurück zum Zitat Pearson, S., and Yee, G., Privacy and security for cloud computing. Springer, Heidelberg, 2003. Pearson, S., and Yee, G., Privacy and security for cloud computing. Springer, Heidelberg, 2003.
8.
Zurück zum Zitat Hou, L., Yang, S., and Chen, Z., The use of data mining techniques and support vector regression for financial forecasting. Int. J. Database Theory Appl. 6(4):145–156, 2013. Hou, L., Yang, S., and Chen, Z., The use of data mining techniques and support vector regression for financial forecasting. Int. J. Database Theory Appl. 6(4):145–156, 2013.
11.
Zurück zum Zitat Bacardit, J., and Llorà, X., Large-scale data mining using genetics-based machine learning. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 3(1):37–61, 2013. doi:10.1002/widm.1078.CrossRef Bacardit, J., and Llorà, X., Large-scale data mining using genetics-based machine learning. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 3(1):37–61, 2013. doi:10.​1002/​widm.​1078.CrossRef
12.
Zurück zum Zitat Chen, T. S., Lin, C. C., Chiu, Y. H., Lin, H. L., and Chen, R. C., A new binary classifier: Clustering-launched classification. Lect. Notes in Comput. Sci. 4114:278–283, 2006. doi:10.1007/11816171_35.CrossRef Chen, T. S., Lin, C. C., Chiu, Y. H., Lin, H. L., and Chen, R. C., A new binary classifier: Clustering-launched classification. Lect. Notes in Comput. Sci. 4114:278–283, 2006. doi:10.​1007/​11816171_​35.CrossRef
13.
Zurück zum Zitat Chen, T. S., Chen, J., Lin, Y. C., Tsai, Y. C., Kao, Y. H., and Wu, K., A novel knowledge protection technique base on support vector machine model for anti-classification. Electr. Eng. Control 98:517–524, 2011. doi:10.1007/978-3-642-21765-4_63.CrossRef Chen, T. S., Chen, J., Lin, Y. C., Tsai, Y. C., Kao, Y. H., and Wu, K., A novel knowledge protection technique base on support vector machine model for anti-classification. Electr. Eng. Control 98:517–524, 2011. doi:10.​1007/​978-3-642-21765-4_​63.CrossRef
14.
Zurück zum Zitat Clifton, C., Kantarcioglu, M., and Vaidya, J., Defining privacy for data mining. Proceedings of the National Science Foundation Workshop on Next Generation Data Mining 126–133, 2002. Clifton, C., Kantarcioglu, M., and Vaidya, J., Defining privacy for data mining. Proceedings of the National Science Foundation Workshop on Next Generation Data Mining 126–133, 2002.
16.
Zurück zum Zitat Bertino, E., Ghinita, G., Kantarcioglu, M., Nguyen, D., Park, J., Sandhu, R., Sultana, S., Thuraisingham, B, and Xu, S., A roadmap for privacy-enhanced secure data provenance. Journal of Intelligent Information Systems 43(3): 481–501, 2014. doi:10.1007/s10844-014-0322-7 Bertino, E., Ghinita, G., Kantarcioglu, M., Nguyen, D., Park, J., Sandhu, R., Sultana, S., Thuraisingham, B, and Xu, S., A roadmap for privacy-enhanced secure data provenance. Journal of Intelligent Information Systems 43(3): 481–501, 2014. doi:10.​1007/​s10844-014-0322-7
18.
Zurück zum Zitat Hubbard, D., and Sutton, M., Top threats to cloud computing V1. 0. Cloud Security Alliance, 2010. Hubbard, D., and Sutton, M., Top threats to cloud computing V1. 0. Cloud Security Alliance, 2010.
19.
Zurück zum Zitat Jansen, W. A., Cloud hooks: Security and privacy issues in cloud computing. Proceedings of the 44th Hawaii International Conference on System Sciences 1–10, 2011. doi:10.1109/HICSS.2011.103. Jansen, W. A., Cloud hooks: Security and privacy issues in cloud computing. Proceedings of the 44th Hawaii International Conference on System Sciences 1–10, 2011. doi:10.​1109/​HICSS.​2011.​103.
24.
Zurück zum Zitat Hao, Z., Zhong, S., and Yu, N., A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9):1432–1437, 2011. doi:10.1109/TKDE.2011.62.CrossRef Hao, Z., Zhong, S., and Yu, N., A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9):1432–1437, 2011. doi:10.​1109/​TKDE.​2011.​62.CrossRef
25.
Zurück zum Zitat Sasikala, I. S., and Banu, N., Privacy preserving data mining using piecewise vector quantization (PVQ). Int. J. Adv. Res. Comput. Sci. Technol. 2(3):302–306, 2014. Sasikala, I. S., and Banu, N., Privacy preserving data mining using piecewise vector quantization (PVQ). Int. J. Adv. Res. Comput. Sci. Technol. 2(3):302–306, 2014.
28.
Zurück zum Zitat Liu, K., and Kargupta, H., Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1):92–106, 2006. doi:10.1109/TKDE.2006.14.CrossRef Liu, K., and Kargupta, H., Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1):92–106, 2006. doi:10.​1109/​TKDE.​2006.​14.CrossRef
32.
Zurück zum Zitat Chen, T. S., Chen, J., Lin, Y. C., and Tsai, Y. C., Research to protect database by shaking random sampling interference (SRSI). Proceedings of the 2009 Global Congress on Intelligent Systems 569–572, 2009. doi:10.1109/GCIS.2009.384. Chen, T. S., Chen, J., Lin, Y. C., and Tsai, Y. C., Research to protect database by shaking random sampling interference (SRSI). Proceedings of the 2009 Global Congress on Intelligent Systems 569–572, 2009. doi:10.​1109/​GCIS.​2009.​384.
33.
Zurück zum Zitat Chen, T. S., Chen, J., Kao, Y. H., and Hsieh, T. C., A novel anti-data mining technique based on hierarchical anti-clustering (HAC). Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications 426–430, 2008. doi:10.1109/ISDA.2008.155 Chen, T. S., Chen, J., Kao, Y. H., and Hsieh, T. C., A novel anti-data mining technique based on hierarchical anti-clustering (HAC). Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications 426–430, 2008. doi:10.​1109/​ISDA.​2008.​155
35.
Zurück zum Zitat Lin, J. S., Tien, S. W., Chen, T. S., Kao, Y. H., Lin, C. C., and Chiu, Y. H., Referential hierarchical clustering algorithm based upon principal component analysis and genetic algorithm. Proceedings of the WSEAS International Conference on Applied Computer Science 139–143, 2007. Lin, J. S., Tien, S. W., Chen, T. S., Kao, Y. H., Lin, C. C., and Chiu, Y. H., Referential hierarchical clustering algorithm based upon principal component analysis and genetic algorithm. Proceedings of the WSEAS International Conference on Applied Computer Science 139–143, 2007.
36.
Zurück zum Zitat Rüping, S., mySVM-manual. University of Dortmund, 2000. Rüping, S., mySVM-manual. University of Dortmund, 2000.
Metadaten
Titel
A Novel Anti-classification Approach for Knowledge Protection
verfasst von
Chen-Yi Lin
Tung-Shou Chen
Hui-Fang Tsai
Wei-Bin Lee
Tien-Yu Hsu
Yuan-Hung Kao
Publikationsdatum
01.10.2015
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 10/2015
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0305-4

Weitere Artikel der Ausgabe 10/2015

Journal of Medical Systems 10/2015 Zur Ausgabe