On Mining Sensitive Rules to Identify Privacy Threats

被引:0
|
作者
Diaz, Irene [1 ]
Rodriguez-Muniz, Luis J. [2 ]
Troiano, Luigi [3 ]
机构
[1] Univ Oviedo, Dept Comp Sci, Oviedo, Spain
[2] Univ Oviedo, Dept Stat & O R, Oviedo, Spain
[3] Univ Sannio, Dept Engn, Sannio, Italy
来源
关键词
disclosure control; association rules; data privacy; anonymity; DISCLOSURE; MICRODATA;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data mining techniques represent a useful tool to cope with privacy problems. In this work an association rule mining algorithm adapted to the privacy context is developed. The algorithm produces association rules with a certain structure (the premise set is a subset of the public features of a released table while the consequent is the feature to protect). These rules are then used to reveal and explain relationships from data affected by some kind of anonymization process and thus, to detect threats.
引用
收藏
页码:232 / 241
页数:10
相关论文
共 50 条
  • [21] Privacy-Preserving Mining of Association Rules on Distributed Databases
    Chang, Chin-Chen
    Yeh, Jieh-Shan
    Li, Yu-Chiang
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11): : 259 - 266
  • [22] An algorithm for privacy-preserving quantitative association rules mining
    Jing, Weiwei
    Huang, Liusheng
    Luo, Yonglong
    Xu, Weijiang
    Yao, Yifei
    [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 315 - +
  • [23] A New Model for Privacy Preserving Sensitive Data Mining
    Prakash, M.
    Singaravel, G.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [24] Sensitive Items in Privacy Preserving - Association Rule Mining
    Duraiswamy, K.
    Maheswari, N.
    [J]. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2008, 7 (01) : 31 - 35
  • [25] A Privacy Preserving Data Mining Methodology for Dynamically Predicting Emerging Human Threats
    Manohar, Gautam
    Tucker, Conrad S.
    [J]. PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2013, VOL 2A, 2014,
  • [26] Privacy Prevention of Sensitive Rules and Values using Perturbation Technique
    Shinde, Aparna
    Saxena, Khushboo
    Mishra, Amit
    Sahu, Shiv K.
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 577 - 581
  • [27] Privacy-Preserving Data Mining in Spatiotemporal Databases Based on Mining Negative Association Rules
    Ranjith, K. S.
    Mary, A. Geetha
    [J]. EMERGING RESEARCH IN DATA ENGINEERING SYSTEMS AND COMPUTER COMMUNICATIONS, CCODE 2019, 2020, 1054 : 329 - 339
  • [28] Privacy Parallel Algorithm for Mining Association Rules and Its Application in HRM
    Zhang, XuePing
    Zhu, YanXia
    Hua, Nan
    [J]. SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 296 - +
  • [29] A privacy-preserving mining algorithm of association rules in distributed databases
    Liu, Jie
    Piao, Xiufeng
    Huang, Shaobin
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 746 - +
  • [30] Optimization for MASK scheme in privacy preserving data mining for association rules
    Andruszkiewicz, Piotr
    [J]. ROUGH SETS AND INTELLIGENT SYSTEMS PARADIGMS, PROCEEDINGS, 2007, 4585 : 465 - 474