Privacy protection in data mining: A perturbation approach for categorical data

被引:21
作者
Li, Xiao-Bai [1 ]
Sarkar, Sumit
机构
[1] Univ Massachusetts, Coll Management, Lowell, MA 01854 USA
[2] Univ Texas, Sch Management, Richardson, TX 75080 USA
关键词
privacy; data confidentiality; data mining; linear programming; Bayesian estimation; data swapping;
D O I
10.1287/isre.1060.0095
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
To respond to growing concerns about privacy of personal information, organizations that use their customers' records in data-mining activities are forced to take actions to protect the privacy of the individuals involved. A common practice for many organizations today is to remove identity-related attributes from the customer records before releasing them to data miners or analysts. We investigate the effect of this practice and demonstrate that many records in a data set could be uniquely identified even after identity-related attributes are removed. We propose a perturbation method for categorical data that can be used by organizations to prevent or limit disclosure of confidential data for identifiable records when the data are provided to analysts for classification, a common data-mining task. The proposed method attempts to preserve the statistical properties of the data based on privacy protection parameters specified by the organization. We show that the problem can be solved in two phases, with a linear programming formulation in Phase I (to preserve the first-order marginal distribution), followed by a simple Bayes-based swapping procedure in Phase 11 (to preserve the joint distribution).
引用
收藏
页码:254 / 270
页数:17
相关论文
共 50 条
[41]   A Method for Preservation of Privacy in Data Mining Processes [J].
Liang, Danyan ;
Busch, Peter ;
Picoto, Winnie .
VISION 2020: SUSTAINABLE ECONOMIC DEVELOPMENT AND APPLICATION OF INNOVATION MANAGEMENT, 2018, :203-223
[42]   Privacy Preserving Data Mining: A Parametric Analysis [J].
Patel, Darshana ;
Kotecha, Radhika .
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 :139-149
[43]   The limits of privacy in automated profiling and data mining [J].
Schermer, Bart W. .
COMPUTER LAW & SECURITY REVIEW, 2011, 27 (01) :45-52
[44]   Privacy-preserving data mining systems [J].
Zhang, Nan ;
Zhao, Wei .
COMPUTER, 2007, 40 (04) :52-+
[45]   Privacy preserving data mining of sequential patterns for network traffic data [J].
Kim, Seung-Woo ;
Park, Sanghyun ;
Won, Jung-Im ;
Kim, Sang-Wook .
INFORMATION SCIENCES, 2008, 178 (03) :694-713
[46]   Privacy preserving data mining of sequential patterns for network traffic data [J].
Kim, Seung-Woo ;
Park, Sanghyun ;
Won, Jung-Im ;
Kim, Sang-Wook .
ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 :201-+
[47]   Privacy and data mining: evaluating the impact of data anonymization on classification algorithms [J].
Silva, Hebert O. ;
Basso, Tania ;
Moraes, Regina .
2017 13TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2017), 2017, :111-116
[48]   Quantifying privacy for privacy preserving data mining [J].
Zhan, Justin .
2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, :630-636
[49]   Protection of Big Data Privacy [J].
Mehmood, Abid ;
Natgunanathan, Iynkaran ;
Xiang, Yong ;
Hua, Guang ;
Guo, Song .
IEEE ACCESS, 2016, 4 :1821-1834
[50]   Data protection: The future of privacy [J].
Wong, Rebecca .
COMPUTER LAW & SECURITY REVIEW, 2011, 27 (01) :53-57