Privacy protection in data mining: A perturbation approach for categorical data

被引:21
作者
Li, Xiao-Bai [1 ]
Sarkar, Sumit
机构
[1] Univ Massachusetts, Coll Management, Lowell, MA 01854 USA
[2] Univ Texas, Sch Management, Richardson, TX 75080 USA
关键词
privacy; data confidentiality; data mining; linear programming; Bayesian estimation; data swapping;
D O I
10.1287/isre.1060.0095
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
To respond to growing concerns about privacy of personal information, organizations that use their customers' records in data-mining activities are forced to take actions to protect the privacy of the individuals involved. A common practice for many organizations today is to remove identity-related attributes from the customer records before releasing them to data miners or analysts. We investigate the effect of this practice and demonstrate that many records in a data set could be uniquely identified even after identity-related attributes are removed. We propose a perturbation method for categorical data that can be used by organizations to prevent or limit disclosure of confidential data for identifiable records when the data are provided to analysts for classification, a common data-mining task. The proposed method attempts to preserve the statistical properties of the data based on privacy protection parameters specified by the organization. We show that the problem can be solved in two phases, with a linear programming formulation in Phase I (to preserve the first-order marginal distribution), followed by a simple Bayes-based swapping procedure in Phase 11 (to preserve the joint distribution).
引用
收藏
页码:254 / 270
页数:17
相关论文
共 50 条
[31]   Data Mining and Privacy of Social Network Sites' Users: Implications of the Data Mining Problem [J].
Al-Saggaf, Yeslam ;
Islam, Md Zahidul .
SCIENCE AND ENGINEERING ETHICS, 2015, 21 (04) :941-966
[32]   Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography [J].
Murugeshwari, B. ;
Selvaraj, D. ;
Sudharson, K. ;
Radhika, S. .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (01) :839-851
[33]   A Survey on Privacy Issues and Privacy Preservation in Spatial Data Mining [J].
Kamakshi, P. .
2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, :1759-1762
[34]   A fuzzy programming approach for data reduction and privacy in distance-based mining [J].
Mukherjee, Shibnath ;
Chen, Zhiyuan ;
Gangopadhyay, Aryya .
International Journal of Information and Computer Security, 2008, 2 (01) :27-47
[35]   Privacy preserving data mining [J].
Lindell, Y ;
Pinkas, B .
JOURNAL OF CRYPTOLOGY, 2002, 15 (03) :177-206
[36]   Privacy during Data Mining [J].
Kumari, Aruna ;
Rao, K. Rajasekhara ;
Suman, M. .
EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 :593-600
[37]   Privacy in Data Mining: A Review [J].
Dutta, Sharmistha ;
Gupta, Ankit Kumar .
PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, :556-559
[38]   PRIVACY PRESERVING DATA MINING APPROACH FOR EXTRACTING FUZZY RULES [J].
Gomathi, S. ;
Amma, N. G. Bhuvaneswari .
PROCEEDINGS OF 2015 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2015,
[39]   A New Hybrid Approach for Privacy Preserving Distributed Data Mining [J].
Sun, Chongjing ;
Gao, Hui ;
Zhou, Junlin ;
Fu, Yan ;
She, Li .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (04) :876-883
[40]   IMPROVING THE PERFORMANCE OF EXACT APPROACH FOR PRIVACY PRESERVING IN DATA MINING [J].
LaMacchia, Carolyn .
2016 BAASANA INTERNATIONAL CONFERENCE PROCEEDINGS, 2016, :95-106