On Mining Sensitive Rules to Identify Privacy Threats

被引:0
|
作者
Diaz, Irene [1 ]
Rodriguez-Muniz, Luis J. [2 ]
Troiano, Luigi [3 ]
机构
[1] Univ Oviedo, Dept Comp Sci, Oviedo, Spain
[2] Univ Oviedo, Dept Stat & O R, Oviedo, Spain
[3] Univ Sannio, Dept Engn, Sannio, Italy
来源
关键词
disclosure control; association rules; data privacy; anonymity; DISCLOSURE; MICRODATA;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data mining techniques represent a useful tool to cope with privacy problems. In this work an association rule mining algorithm adapted to the privacy context is developed. The algorithm produces association rules with a certain structure (the premise set is a subset of the public features of a released table while the consequent is the feature to protect). These rules are then used to reveal and explain relationships from data affected by some kind of anonymization process and thus, to detect threats.
引用
收藏
页码:232 / 241
页数:10
相关论文
共 50 条
  • [1] Privacy preserving mining of association rules
    Evfimievski, A
    Srikant, R
    Agrawal, R
    Gehrke, J
    [J]. INFORMATION SYSTEMS, 2004, 29 (04) : 343 - 364
  • [2] Privacy and Confidentiality in Process Mining: Threats and Research Challenges
    Elkoumy, Gamal
    Fahrenkrog-Petersen, Stephan A.
    Sani, Mohammadreza Fani
    Koschmider, Agnes
    Mannhardt, Felix
    Von Voigt, Saskia Nunez
    Rafiei, Majid
    Von Waldthausen, Leopold
    [J]. ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2022, 13 (01)
  • [3] Preserving Privacy in Mining Quantitative Associations Rules
    Ahluwalia, Madhu V.
    Gangopadhyay, Aryya
    Chen, Zhiyuan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (04) : 1 - 17
  • [4] Interpretability of fuzzy association rules as means of discovering threats to privacy
    Troiano, Luigi
    Rodriguez-Muniz, Luis J.
    Ranilla, Jose
    Diaz, Irene
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (03) : 325 - 333
  • [5] On association rules mining algorithms with data privacy preserving
    Gorawski, M
    Stachurski, K
    [J]. ADVANCES IN WEB INTELLIGENCE, PROCEEDINGS, 2005, 3528 : 170 - 175
  • [6] Privacy preserving in association rules mining with VPA Algorithm
    Zhang, Yitao
    Tang, Wenliang
    Xie, Chengwang
    Xiong, Jidiang
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3060 - 3063
  • [7] Privacy Association Rules Mining-Related Technology
    Zhao, Chun-hui
    Lv, Li-ping
    [J]. 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 4, 2011, : 132 - 135
  • [8] Reduction Relaxation in Privacy Preserving Association Rules Mining
    Andruszkiewicz, Piotr
    [J]. ADVANCES IN DATABASES AND INFORMATION SYSTEMS, 2013, 186 : 1 - 8
  • [9] Using data mining to identify structural rules in proteins
    Stelle, Diogo
    Barioni, Maria C.
    Scott, Luis P.
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2011, 218 (05) : 1997 - 2004
  • [10] Hiding sensitive patterns for association rules mining
    Jiang, Ji-Han
    Chi, Kuang-Hui
    Kuo, Wen-Chung
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2006, 5 : 229 - 232