Privacy protection in data mining: A perturbation approach for categorical data

被引:21
作者
Li, Xiao-Bai [1 ]
Sarkar, Sumit
机构
[1] Univ Massachusetts, Coll Management, Lowell, MA 01854 USA
[2] Univ Texas, Sch Management, Richardson, TX 75080 USA
关键词
privacy; data confidentiality; data mining; linear programming; Bayesian estimation; data swapping;
D O I
10.1287/isre.1060.0095
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
To respond to growing concerns about privacy of personal information, organizations that use their customers' records in data-mining activities are forced to take actions to protect the privacy of the individuals involved. A common practice for many organizations today is to remove identity-related attributes from the customer records before releasing them to data miners or analysts. We investigate the effect of this practice and demonstrate that many records in a data set could be uniquely identified even after identity-related attributes are removed. We propose a perturbation method for categorical data that can be used by organizations to prevent or limit disclosure of confidential data for identifiable records when the data are provided to analysts for classification, a common data-mining task. The proposed method attempts to preserve the statistical properties of the data based on privacy protection parameters specified by the organization. We show that the problem can be solved in two phases, with a linear programming formulation in Phase I (to preserve the first-order marginal distribution), followed by a simple Bayes-based swapping procedure in Phase 11 (to preserve the joint distribution).
引用
收藏
页码:254 / 270
页数:17
相关论文
共 50 条
[21]   Privacy in data mining [J].
Domingo-Ferrer, J ;
Torra, V .
DATA MINING AND KNOWLEDGE DISCOVERY, 2005, 11 (02) :117-119
[22]   Privacy-preserving data mining: A feature set partitioning approach [J].
Matatov, Nissim ;
Rokach, Lior ;
Maimon, Oded .
INFORMATION SCIENCES, 2010, 180 (14) :2696-2720
[23]   An approach for prevention of privacy breach and information leakage in sensitive data mining [J].
Prakash, M. ;
Singaravel, G. .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 45 :134-140
[24]   Medical privacy versus data mining [J].
Farkas, C ;
Valtorta, M ;
Fenner, S .
WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVII, PROCEEDINGS: CYBERNETICS AND INFORMATICS: CONCEPTS AND APPLICATIONS (PT II), 2001, :194-199
[25]   A Survey on Privacy Preserving Data Mining [J].
Saranya, K. ;
Premalatha, K. ;
Rajasekar, S. S. .
2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, :1740-U2102
[26]   Data protection, privacy [J].
La Monaca, G. ;
Schiralli, I. .
CLINICA TERAPEUTICA, 2010, 161 (02) :189-191
[27]   An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks [J].
Dev, Himel ;
Sen, Tanmoy ;
Basak, Madhusudan ;
Ali, Mohammed Eunus .
2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, :1106-1115
[28]   Privacy preserving data mining algorithms without the use of secure computation or perturbation [J].
Gurevich, Alex ;
Gudes, Ehud .
10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, :121-128
[29]   A New Range Noise Perturbation Method based on Privacy Preserving Data Mining [J].
Shan, Jinzhao ;
Lin, Ying ;
Zhu, Xiaoke .
PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, :131-136
[30]   Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem [J].
Yeslam Al-Saggaf ;
Md Zahidul Islam .
Science and Engineering Ethics, 2015, 21 :941-966