An Improved Method for Privacy Preserving Data Mining

被引:4
|
作者
Poovammal, E. [1 ]
Ponnavaikko, M. [2 ]
机构
[1] SRM Univ, Dept CSE, Madras, Tamil Nadu, India
[2] Bharathidasan Univ, Trichi, India
关键词
anonymity; fuzzy method; personalized privacy; privacy preservation; Quasi-; identifiers;
D O I
10.1109/IADCC.2009.4809231
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the light of developments in technology to analyze personal data, public concerns regarding privacy are rising. Often a data holder, such as a hospital or bank needs to share person specific records in such a way that the identities of the individuals who are the subjects of data cannot be determined. The generalization techniques such as K-anonymous, L-diverse and t- closeness were given as solutions to solve the problem of privacy breach, at the cost of information loss. Also, a very few papers dealt with personalized generalization. But, all these methods were developed to solve the external linkage problem resulting in sensitive attribute disclosure. It is very easy to prevent sensitive attribute disclosure by simply not publishing quasi-identifiers and sensitive attributes together. But the only reason to publish generalized quasi identifiers and sensitive attributes together is to support data mining tasks that consider both types of attributes in the database. Our goal in this paper is to eliminate the privacy breach (how much an adversary learn from the published data) and increase utility (accuracy of data mining task) of a released database. This is achieved by transforming a part of quasi-identifier and personalizing the sensitive attribute values. Our experiment conducted on the datasets from the UCI machine repository demonstrates that there is incremental gain in data mining utility while preserving the privacy to a great extend.
引用
收藏
页码:1453 / +
页数:2
相关论文
共 50 条
  • [1] Remodeling: improved privacy preserving data mining (PPDM)
    Shastri M.D.
    Pandit A.A.
    [J]. International Journal of Information Technology, 2021, 13 (1) : 131 - 137
  • [2] Privacy preserving method for knowledge discovered by data mining
    Tedmori, Sara
    [J]. International Journal of Information and Communication Technology, 2019, 14 (01): : 31 - 45
  • [3] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [4] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206
  • [5] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [6] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [7] Distributed Privacy-preserving Data Mining Method Research
    Chen, Qi
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 88 - 90
  • [8] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [9] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [10] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175