Attribute based privacy impact assessment method for the protection of personal data

被引:0
作者
Takci, Hidayet [1 ]
Canbay, Pelin [2 ]
机构
[1] Cumhuriyet Univ, Bilgisayar Muhendisligi Bolumu, TR-58800 Sivas, Turkey
[2] Hacettepe Univ, Bilgisayar Muhendisligi Bolumu, TR-06800 Ankara, Turkey
来源
JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY | 2017年 / 32卷 / 04期
关键词
Privacy; homogeneity; sensibility; grouping;
D O I
10.17341/gazimmfd.369733
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Personal data is sensitive information asset primarily needed to be protected. In order to protect personal data, privacy-protected rules, designs, guidelines, and legal arrangements have been developed so far. Especially, Privacy Impact Assessment methods have been developed with a growing interest in European countries. However, developing information technologies leave these studies insufficient. In this work, a new feature based Privacy Impact Assessment method is proposed for the purpose of protection of personal data. This study focuses on evaluating the privacy impact of data set at attribute level instead of evaluating all of the data which is a general approach to protect data. With the help of calculation at feature level, more sensitive and private personal data parts can be defined and hidden. Data homogeneity method is preferred for privacy impact evaluation calculations. The outcome of this work is data items grouped by privacy impact. According to our proposal, more homogeneous data is more sensitive and its privacy is important. The proposed method is tested on two different data set and the obtained results are analyzed. The most important finding of our work is that attributes that do not appear to be private can be private after combining attributes.
引用
收藏
页码:1301 / 1310
页数:10
相关论文
共 22 条
[1]  
Aggarwal CC, 2008, ADV DATABASE SYST, V34, P11
[2]  
[Anonymous], 2004, Information Security Technical Report, DOI DOI 10.1016/S1363-4127(04)00014-7
[3]  
[Anonymous], 2002, ACM Sigkdd Explorations Newsletter, DOI [10.1145/772862.772867, DOI 10.1145/772862.772867]
[4]  
[Anonymous], 2016, STANFORD ENCY PHILOS
[5]  
Canbay P, 2014, THESIS
[6]   The Effect of Clustering on Data Privacy [J].
Canbay, Pelin ;
Sever, Hayri .
2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, :277-282
[7]  
Cavoukian Ann, 2010, Identity in the Information Society, V3, P405, DOI 10.1007/s12394-010-0053-z
[8]  
DeCew JudithWagner., 1997, PURSUIT PRIVACY LAW
[9]  
Frank A., 2010, UCI Machine Learning Repository
[10]   Value Sensitive Design and Information Systems [J].
Friedman, Batya ;
Kahn, Peter H., Jr. ;
Borning, Alan .
EARLY ENGAGEMENT AND NEW TECHNOLOGIES: OPENING UP THE LABORATORY, 2013, 16 :55-95