A k-anonymous rule clustering approach for data publishing

被引:1
作者
Ohki M. [1 ]
Inuiguchi M. [1 ]
机构
[1] Osaka University, 1-3 Machikaneyama, Toyonaka, Osaka
来源
| 1600年 / Fuji Technology Press卷 / 21期
关键词
Clustering; Decision rule; K-anonymity; Similarity;
D O I
10.20965/jaciii.2017.p0980
中图分类号
学科分类号
摘要
Classification rules should be open for public inspection to ensure fairness. These rules can be originally induced from some dataset. If induced classification rules are supported only by a small number of objects in the dataset, publication can lead to identification of objects supporting the rule, given their speciality. Eventually, it is possible to retrieve information about the identified objects. This identifiability is not desirable in terms of data privacy. In this paper, to avoid such privacy breaches, we propose rule clustering for achieving k-anonymity of all induced rules, i.e., the induced rules are supported by at least k objects in the dataset. The proposed approach merges similar rules to satisfy k-anonymity while aiming to maintain the classification accuracy. Two numerical experiments were executed to verify both the accuracy of the classifier with the rules obtained by the proposed method and the ratio of decision classes revealed from leaked information about objects. The experimental results show the usefulness of the proposed method.
引用
收藏
页码:980 / 988
页数:8
相关论文
共 20 条
  • [1] Sweeney L., K-anonymity: A model for protecting privacy, Int. J. on Uncertainty Fuzziness and Knowledge-based System, 10, 5, pp. 557-570, (2002)
  • [2] Agrawal R., Srikant R., Fast algorithms for mining association rules, VLDB '94 Proc. of the 20th Int. Conf. on Very Large Data Bases, pp. 487-499, (1994)
  • [3] Tai C.H., Yu P.S., Chen M.S., K-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining, Proc. of the 16th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 473-482, (2010)
  • [4] Zhu Z., Du W., K-anonymous association rule hiding, Proc. of the 5th ACM Symp. on Information, Computer and Communications Security, pp. 305-309, (2010)
  • [5] Narges J.G., Mohammad N.D., A survey on privacy preserving association rule mining, Advances in Computer Science: An Int. J., 4, 14, pp. 41-48, (2015)
  • [6] Khyati B.J., Jignesh V., Dhiren R.P., A survey on association rule hiding methods, Int. J. of Computer Application, 82, 13, pp. 20-25, (2013)
  • [7] Pawlak Z., Rough sets, Int. J. of Computer and Information Sciences, 11, 5, pp. 341-356, (1982)
  • [8] Ytow N., Morse D.R., McL Roberts D., Rough set approximation as formal concept, J. Adv. Comput. Intell. Intell. Inform., 10, 5, pp. 606-611, (2006)
  • [9] Yamaguchi N., Wu M., Nakata M., Sakai H., Application of rough set-based information analysis to questionnaire data, J. Adv. Comput. Intell. Intell. Inform., 18, 6, pp. 953-961, (2014)
  • [10] Inuiguchi M., Washimi K., Improving rough set rule-based classification by supplementary rules, J. Adv. Comput. Intell. Intell. Inform., 19, 6, pp. 747-758, (2015)