Information Disclosure, Security, and Data Quality

被引:0
|
作者
Zaman, A. N. K. [1 ]
Obimbo, Charlie [1 ]
Dara, Rozita A. [1 ]
机构
[1] Univ Guelph, Sch Comp Sci, 50 Stone Rd East, Guelph, ON N1G 2W1, Canada
关键词
Differential privacy; Data anonymization; Privacy preserving data publishing; Data sanitization;
D O I
10.1007/978-3-319-92058-0_75
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data sharing is important to interested parties for mining trends and patterns in designing data-driven decision-making systems. However, sharing raw data creates severe problems like identity theft or personal information leakage such as disclosure of illness of a specific person. This study analyzed results from an Adaptive Differential Privacy (ADiffP) algorithm that satisfies e-differential privacy for publishing sanitized data. The algorithm was tested with two different data sets to measure its robustness by comparing other existing works. The results obtained from the proposed algorithm show that the sanitized data preserves the same pattern as the raw data. Additionally, classification accuracies for sanitized data are also promising.
引用
收藏
页码:768 / 779
页数:12
相关论文
共 50 条
  • [21] The Association Between the Disclosure and the Realization of Information Security Risk Factors
    Wang, Tawei
    Kannan, Karthik N.
    Ulmer, Jackie Rees
    [J]. INFORMATION SYSTEMS RESEARCH, 2013, 24 (02) : 201 - 218
  • [22] SDN Security: Information Disclosure and Flow Table Overflow Attacks
    Patwardhan, Aditya
    Jayarama, Deepthi
    Limaye, Nitish
    Vidhale, Shivaji
    Parekh, Zarna
    Harfoush, Khaled
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [23] Game Analysis on Cost Information Disclosure of Security Housing Price
    Zhang Yu
    Yao Bing
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON CONSTRUCTION & REAL ESTATE MANAGEMENT, VOLS 1 AND 2, 2009, : 1039 - +
  • [24] Is information security under control? Investigating quality in information security management
    Baker, Wade H.
    Wallace, Linda
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (01) : 36 - 44
  • [25] A formal analysis of information disclosure in data exchange
    Miklau, Gerome
    Suciu, Dan
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2007, 73 (03) : 507 - 534
  • [26] Information security and data protection
    Qureshi, AA
    Siegel, JG
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2001, 14 (1-3) : 1 - 16
  • [27] Big data and information security
    Gene Badia, Joan
    Gallo de Puelles, Pedro
    de Lecuona, Itziar
    [J]. ATENCION PRIMARIA, 2018, 50 (01): : 3 - 5
  • [28] Data quality dimensions for information systems security: A theoretical exposition (invited paper)
    Tejay, G
    Dhillon, G
    Chin, AG
    [J]. Security Management, Integrity, and Internal Control in Information Systems, 2005, 193 : 21 - 39
  • [29] Information Security in eLearning: A Discussion of Empirical Data on Information Security and eLearning
    Alwi, Najwa Hayaati Mohd
    Fan, Ip-Shing
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON E-LEARNING, 2010, : 282 - 290
  • [30] The effect of exogenous information on voluntary disclosure and market quality
    Frenkel, Sivan
    Guttman, Ilan
    Kremer, Ilan
    [J]. JOURNAL OF FINANCIAL ECONOMICS, 2020, 138 (01) : 176 - 192