Skip to main content
Top
Published in: Journal of Medical Systems 10/2015

01-10-2015 | Transactional Processing Systems

A Novel Anti-classification Approach for Knowledge Protection

Authors: Chen-Yi Lin, Tung-Shou Chen, Hui-Fang Tsai, Wei-Bin Lee, Tien-Yu Hsu, Yuan-Hung Kao

Published in: Journal of Medical Systems | Issue 10/2015

Login to get access

Abstract

Classification is the problem of identifying a set of categories where new data belong, on the basis of a set of training data whose category membership is known. Its application is wide-spread, such as the medical science domain. The issue of the classification knowledge protection has been paid attention increasingly in recent years because of the popularity of cloud environments. In the paper, we propose a Shaking Sorted-Sampling (triple-S) algorithm for protecting the classification knowledge of a dataset. The triple-S algorithm sorts the data of an original dataset according to the projection results of the principal components analysis so that the features of the adjacent data are similar. Then, we generate noise data with incorrect classes and add those data to the original dataset. In addition, we develop an effective positioning strategy, determining the added positions of noise data in the original dataset, to ensure the restoration of the original dataset after removing those noise data. The experimental results show that the disturbance effect of the triple-S algorithm on the CLC, MySVM, and LibSVM classifiers increases when the noise data ratio increases. In addition, compared with existing methods, the disturbance effect of the triple-S algorithm is more significant on MySVM and LibSVM when a certain amount of the noise data added to the original dataset is reached.
Literature
1.
go back to reference Aggarwal, A., Rani, R., and Dhir, R., Recognition of devanagari handwritten numerals using gradient features and SVM. Int. J. Comput. Appl. 48(8):39–44, 2012. doi:10.5120/7371-0151. Aggarwal, A., Rani, R., and Dhir, R., Recognition of devanagari handwritten numerals using gradient features and SVM. Int. J. Comput. Appl. 48(8):39–44, 2012. doi:10.​5120/​7371-0151.
3.
6.
go back to reference Pearson, S., and Yee, G., Privacy and security for cloud computing. Springer, Heidelberg, 2003. Pearson, S., and Yee, G., Privacy and security for cloud computing. Springer, Heidelberg, 2003.
8.
go back to reference Hou, L., Yang, S., and Chen, Z., The use of data mining techniques and support vector regression for financial forecasting. Int. J. Database Theory Appl. 6(4):145–156, 2013. Hou, L., Yang, S., and Chen, Z., The use of data mining techniques and support vector regression for financial forecasting. Int. J. Database Theory Appl. 6(4):145–156, 2013.
11.
go back to reference Bacardit, J., and Llorà, X., Large-scale data mining using genetics-based machine learning. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 3(1):37–61, 2013. doi:10.1002/widm.1078.CrossRef Bacardit, J., and Llorà, X., Large-scale data mining using genetics-based machine learning. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 3(1):37–61, 2013. doi:10.​1002/​widm.​1078.CrossRef
12.
go back to reference Chen, T. S., Lin, C. C., Chiu, Y. H., Lin, H. L., and Chen, R. C., A new binary classifier: Clustering-launched classification. Lect. Notes in Comput. Sci. 4114:278–283, 2006. doi:10.1007/11816171_35.CrossRef Chen, T. S., Lin, C. C., Chiu, Y. H., Lin, H. L., and Chen, R. C., A new binary classifier: Clustering-launched classification. Lect. Notes in Comput. Sci. 4114:278–283, 2006. doi:10.​1007/​11816171_​35.CrossRef
13.
go back to reference Chen, T. S., Chen, J., Lin, Y. C., Tsai, Y. C., Kao, Y. H., and Wu, K., A novel knowledge protection technique base on support vector machine model for anti-classification. Electr. Eng. Control 98:517–524, 2011. doi:10.1007/978-3-642-21765-4_63.CrossRef Chen, T. S., Chen, J., Lin, Y. C., Tsai, Y. C., Kao, Y. H., and Wu, K., A novel knowledge protection technique base on support vector machine model for anti-classification. Electr. Eng. Control 98:517–524, 2011. doi:10.​1007/​978-3-642-21765-4_​63.CrossRef
14.
go back to reference Clifton, C., Kantarcioglu, M., and Vaidya, J., Defining privacy for data mining. Proceedings of the National Science Foundation Workshop on Next Generation Data Mining 126–133, 2002. Clifton, C., Kantarcioglu, M., and Vaidya, J., Defining privacy for data mining. Proceedings of the National Science Foundation Workshop on Next Generation Data Mining 126–133, 2002.
16.
go back to reference Bertino, E., Ghinita, G., Kantarcioglu, M., Nguyen, D., Park, J., Sandhu, R., Sultana, S., Thuraisingham, B, and Xu, S., A roadmap for privacy-enhanced secure data provenance. Journal of Intelligent Information Systems 43(3): 481–501, 2014. doi:10.1007/s10844-014-0322-7 Bertino, E., Ghinita, G., Kantarcioglu, M., Nguyen, D., Park, J., Sandhu, R., Sultana, S., Thuraisingham, B, and Xu, S., A roadmap for privacy-enhanced secure data provenance. Journal of Intelligent Information Systems 43(3): 481–501, 2014. doi:10.​1007/​s10844-014-0322-7
18.
go back to reference Hubbard, D., and Sutton, M., Top threats to cloud computing V1. 0. Cloud Security Alliance, 2010. Hubbard, D., and Sutton, M., Top threats to cloud computing V1. 0. Cloud Security Alliance, 2010.
19.
go back to reference Jansen, W. A., Cloud hooks: Security and privacy issues in cloud computing. Proceedings of the 44th Hawaii International Conference on System Sciences 1–10, 2011. doi:10.1109/HICSS.2011.103. Jansen, W. A., Cloud hooks: Security and privacy issues in cloud computing. Proceedings of the 44th Hawaii International Conference on System Sciences 1–10, 2011. doi:10.​1109/​HICSS.​2011.​103.
24.
go back to reference Hao, Z., Zhong, S., and Yu, N., A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9):1432–1437, 2011. doi:10.1109/TKDE.2011.62.CrossRef Hao, Z., Zhong, S., and Yu, N., A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9):1432–1437, 2011. doi:10.​1109/​TKDE.​2011.​62.CrossRef
25.
go back to reference Sasikala, I. S., and Banu, N., Privacy preserving data mining using piecewise vector quantization (PVQ). Int. J. Adv. Res. Comput. Sci. Technol. 2(3):302–306, 2014. Sasikala, I. S., and Banu, N., Privacy preserving data mining using piecewise vector quantization (PVQ). Int. J. Adv. Res. Comput. Sci. Technol. 2(3):302–306, 2014.
28.
go back to reference Liu, K., and Kargupta, H., Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1):92–106, 2006. doi:10.1109/TKDE.2006.14.CrossRef Liu, K., and Kargupta, H., Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1):92–106, 2006. doi:10.​1109/​TKDE.​2006.​14.CrossRef
32.
go back to reference Chen, T. S., Chen, J., Lin, Y. C., and Tsai, Y. C., Research to protect database by shaking random sampling interference (SRSI). Proceedings of the 2009 Global Congress on Intelligent Systems 569–572, 2009. doi:10.1109/GCIS.2009.384. Chen, T. S., Chen, J., Lin, Y. C., and Tsai, Y. C., Research to protect database by shaking random sampling interference (SRSI). Proceedings of the 2009 Global Congress on Intelligent Systems 569–572, 2009. doi:10.​1109/​GCIS.​2009.​384.
33.
go back to reference Chen, T. S., Chen, J., Kao, Y. H., and Hsieh, T. C., A novel anti-data mining technique based on hierarchical anti-clustering (HAC). Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications 426–430, 2008. doi:10.1109/ISDA.2008.155 Chen, T. S., Chen, J., Kao, Y. H., and Hsieh, T. C., A novel anti-data mining technique based on hierarchical anti-clustering (HAC). Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications 426–430, 2008. doi:10.​1109/​ISDA.​2008.​155
35.
go back to reference Lin, J. S., Tien, S. W., Chen, T. S., Kao, Y. H., Lin, C. C., and Chiu, Y. H., Referential hierarchical clustering algorithm based upon principal component analysis and genetic algorithm. Proceedings of the WSEAS International Conference on Applied Computer Science 139–143, 2007. Lin, J. S., Tien, S. W., Chen, T. S., Kao, Y. H., Lin, C. C., and Chiu, Y. H., Referential hierarchical clustering algorithm based upon principal component analysis and genetic algorithm. Proceedings of the WSEAS International Conference on Applied Computer Science 139–143, 2007.
36.
go back to reference Rüping, S., mySVM-manual. University of Dortmund, 2000. Rüping, S., mySVM-manual. University of Dortmund, 2000.
Metadata
Title
A Novel Anti-classification Approach for Knowledge Protection
Authors
Chen-Yi Lin
Tung-Shou Chen
Hui-Fang Tsai
Wei-Bin Lee
Tien-Yu Hsu
Yuan-Hung Kao
Publication date
01-10-2015
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 10/2015
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0305-4

Other articles of this Issue 10/2015

Journal of Medical Systems 10/2015 Go to the issue