Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas Brochmann Pedersen is active.

Publication


Featured researches published by Thomas Brochmann Pedersen.


international conference on emerging technologies | 2007

Efficient privacy preserving distributed clustering based on secret sharing

Selim Volkan Kaya; Thomas Brochmann Pedersen; Erkay Savas; Yücel Saygin

In this paper, we propose a privacy preserving distributed clustering protocol for horizontally partitioned data based on a very efficient homomorphic additive secret sharing scheme. The model we use for the protocol is novel in the sense that it utilizes two noncolluding third parties. We provide a brief security analysis of our protocol from information theoretic point of view, which is a stronger security model. We show communication and computation complexity analysis of our protocol along with another protocol previously proposed for the same problem. We also include experimental results for computation and communication overhead of these two protocols. Our protocol not only out-performs the others in execution time and communication overhead on data holders, but also uses a more efficient model for many data mining applications.


data and knowledge engineering | 2010

Discovering private trajectories using background information

Emre Kaplan; Thomas Brochmann Pedersen; Erkay Savas; Yücel Saygin

Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traffic planning, identification of evacuation routes, trend detection, and many more can benefit from trajectory mining. However, the trajectories of individuals often contain private and sensitive information, so anyone who possess trajectory data must take special care when disclosing this data. Removing identifiers from trajectories before the release is not effective against linkage type attacks, and rich sources of background information make it even worse. An alternative is to apply transformation techniques to map the given set of trajectories into another set where the distances are preserved. This way, the actual trajectories are not released, but the distance information can still be used for data mining techniques such as clustering. In this paper, we show that an unknown private trajectory can be reconstructed using the available background information together with the mutual distances released for data mining purposes. The background knowledge is in the form of known trajectories and extra information such as the speed limit. We provide analytical results which bound the number of the known trajectories needed to reconstruct private trajectories. Experiments performed on real trajectory data sets show that the number of known samples is surprisingly smaller than the actual theoretical bounds.


IEEE Transactions on Knowledge and Data Engineering | 2012

A Look-Ahead Approach to Secure Multiparty Protocols

Mehmet Ercan Nergiz; Abdullah Ercüment Çiçek; Thomas Brochmann Pedersen; Yücel Saygin

Secure multiparty protocols have been proposed to enable noncolluding parties to cooperate without a trusted server. Even though such protocols prevent information disclosure other than the objective function, they are quite costly in computation and communication. The high overhead motivates parties to estimate the utility that can be achieved as a result of the protocol beforehand. In this paper, we propose a look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity, which helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the protocol. The look-ahead operation is highly localized and its accuracy depends on the amount of information the parties are willing to share. Experimental results show the effectiveness of the proposed methods.


International Journal of Data Warehousing and Mining | 2011

Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to Vertically Partitioned Spatio-Temporal Data

Can Yildizli; Thomas Brochmann Pedersen; Yücel Saygin; Erkay Savas; Albert Levi

Recent concerns about privacy issues have motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. One approach to develop privacy preserving data mining algorithms is secure multiparty computation, which allows for privacy preserving data mining algorithms that do not trade accuracy for privacy. However, earlier methods suffer from very high communication and computational costs, making them infeasible to use in any real world scenario. Moreover, these algorithms have strict assumptions on the involved parties, assuming involved parties will not collude with each other. In this paper, the authors propose a new secure multiparty computation based k-means clustering algorithm that is both secure and efficient enough to be used in a real world scenario. Experiments based on realistic scenarios reveal that this protocol has lower communication costs and significantly lower computational costs.


data and knowledge engineering | 2009

Impossibility of unconditionally secure scalar products

Thomas Brochmann Pedersen; Erkay Savas

The ability to perform scalar products of two vectors, each known to a different party, is a central problem in privacy preserving data mining and other multi-party computation problems. Ongoing search for both efficient and secure scalar product protocols has revealed that this task is not easy. In this paper we show that, indeed, scalar products can never be made secure in the information theoretical sense. We show that any attempt to make unconditionally secure scalar products will inevitably allow one of the parties to learn the other parties input vector with high probability. On the other hand, we show that under various assumptions, such as the existence of a trusted third party or the difficulty of discrete logarithms, both efficient and secure scalar products do exist. We proposed two new protocols for secure scalar products and compare their performance with existing secure scalar products.


international conference on knowledge based and intelligent information and engineering systems | 2008

Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties

Emre Kaplan; Thomas Brochmann Pedersen; Erkay Savas; Yücel Saygin

Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-processed to obtain trajectories which are sequences of spatio-temporal data points belonging to a moving object. Recently, advanced data mining techniques have been developed for extracting patterns from moving object trajectories to enable applications such as city traffic planning, identification of evacuation routes, trend detection, and many more. However, when special care is not taken, trajectories of individuals may also pose serious privacy risks even after they are de-identified or mapped into other forms. In this paper, we show that an unknown private trajectory can be re-constructed from knowledge of its properties released for data mining, which at first glance may not seem to pose any privacy threats. In particular, we propose a technique to demonstrate how private trajectories can be re-constructed from knowledge of their distances to a bounded set of known trajectories. Experiments performed on real data sets show that the number of known samples is surprisingly smaller than the actual theoretical bounds. Keywords: Privacy, Spatio-temporal data, trajectories, data mining.


Archive | 2007

Secret charing vs. encryption-based techniques for privacy preserving data mining

Thomas Brochmann Pedersen; Yücel Saygin; Erkay Savas


statistical and scientific database management | 2008

Disclosure Risks of Distance Preserving Data Transformations

E. Onur Turgay; Thomas Brochmann Pedersen; Yücel Saygin; Erkay Savas; Albert Levi


international conference on social computing | 2010

Practical and Secure Integer Comparison and Interval Check

Ahmet Erhan Nergiz; Mehmet Ercan Nergiz; Thomas Brochmann Pedersen; Chris Clifton


international conference on security and cryptography | 2008

IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION

Cengiz Örencik; Thomas Brochmann Pedersen; Erkay Savas; Mehmet Keskinoz

Collaboration


Dive into the Thomas Brochmann Pedersen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge