A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining

被引:0
作者
Tsiafoulis, S. [1 ]
Zorkadis, V. C. [1 ]
Karras, D. A. [2 ]
机构
[1] Data Protect Author, 1-3 Kifisias Av, Athens 11523, Greece
[2] Chalkis Inst Technol, Automat Dept, Psachna 34400, Evoia, Greece
来源
GRID AND DISTRIBUTED COMPUTING, CONTROL AND AUTOMATION | 2010年 / 121卷
关键词
Privacy Enhancing Technologies; SOM; k-anonymity; l-diversity;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The l-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.
引用
收藏
页码:269 / +
页数:2
相关论文
共 12 条
  • [1] Bayardo R., 2005, P 21 INT C
  • [2] Gkoulalas-Divanis A., 2009, Crossroads, V15, P6
  • [3] IYENGAR V, 2002, TRANSFORMING DATA SA
  • [4] Machanavajjhala A., 2007, ACM T KNOWL DISCOV D, V1, P3, DOI [DOI 10.1145/1217299.1217302, 10.1145/1217299.1217302]
  • [5] Rymon R, 1992, SEARCH SYSTEMATIC SE
  • [6] SWEENEY L, 2002, ACHIEVING K ANONYMIT
  • [7] *UCI, IRV MACH LEARN REP
  • [8] Webb G.I., 1995, OPUS EFFCIENT ADMISS
  • [9] WHITLEY D, 1989, PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON GENETIC ALGORITHMS, P116
  • [10] XIAO X, 2006, VLDB, P139