An Improved Method for Privacy Preserving Data Mining

被引:4
|
作者
Poovammal, E. [1 ]
Ponnavaikko, M. [2 ]
机构
[1] SRM Univ, Dept CSE, Madras, Tamil Nadu, India
[2] Bharathidasan Univ, Trichi, India
来源
2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3 | 2009年
关键词
anonymity; fuzzy method; personalized privacy; privacy preservation; Quasi-; identifiers;
D O I
10.1109/IADCC.2009.4809231
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the light of developments in technology to analyze personal data, public concerns regarding privacy are rising. Often a data holder, such as a hospital or bank needs to share person specific records in such a way that the identities of the individuals who are the subjects of data cannot be determined. The generalization techniques such as K-anonymous, L-diverse and t- closeness were given as solutions to solve the problem of privacy breach, at the cost of information loss. Also, a very few papers dealt with personalized generalization. But, all these methods were developed to solve the external linkage problem resulting in sensitive attribute disclosure. It is very easy to prevent sensitive attribute disclosure by simply not publishing quasi-identifiers and sensitive attributes together. But the only reason to publish generalized quasi identifiers and sensitive attributes together is to support data mining tasks that consider both types of attributes in the database. Our goal in this paper is to eliminate the privacy breach (how much an adversary learn from the published data) and increase utility (accuracy of data mining task) of a released database. This is achieved by transforming a part of quasi-identifier and personalizing the sensitive attribute values. Our experiment conducted on the datasets from the UCI machine repository demonstrates that there is incremental gain in data mining utility while preserving the privacy to a great extend.
引用
收藏
页码:1453 / +
页数:2
相关论文
共 50 条
  • [1] Data Mining for Privacy Preserving Association Rules Based on Improved MASK Algorithm
    Lou, Haoliang
    Ma, Yunlong
    Zhang, Feng
    Liu, Min
    Shen, Weiming
    PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2014, : 265 - 270
  • [2] An Fifficient Method for Privacy Preserving Data Mining in Secure Multiparty Computation
    Pathak, Neha
    Pandey, Shweta
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [3] An Efficient Approach for Privacy Preserving in Data Mining
    Sharma, Manish
    Chaudhary, Atul
    Mathuria, Manish
    Chaudhary, Shalini
    Kumar, Santosh
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 244 - 249
  • [4] A survey on anonymity for privacy preserving data mining
    Zhang, X. X.
    Liu, Q.
    Liu, D. M.
    Xie, W.
    INFORMATION SCIENCE AND ELECTRONIC ENGINEERING, 2017, : 343 - 346
  • [5] Privacy preserving data mining algorithms by data distortion
    Wu Xiao-dan
    Yue Dian-min
    Liu Feng-li
    Wang Yun-feng
    Chu Chao-Hsien
    PROCEEDINGS OF THE 2006 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (13TH), VOLS 1-3, 2006, : 223 - 228
  • [6] Efficient method in association rule hiding for privacy preserving with data mining approach
    Praveena K.
    Sirisha G.
    Babu S.S.
    Rao P.S.
    Ingenierie des Systemes d'Information, 2019, 24 (01): : 47 - 50
  • [7] Privacy Preserving Data Mining-"A State of the Art"
    Narwaria, Mamta
    Arya, Suchita
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2108 - 2112
  • [8] A New Model for Privacy Preserving Sensitive Data Mining
    Prakash, M.
    Singaravel, G.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [9] ANALYSIS OF PRIVACY PRESERVING ECHANISMS FOR OUTSOURCED DATA MINING
    Agrawal, Khushbu
    Tewari, Vandan
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 572 - 576
  • [10] A Close Look at Privacy Preserving Data Mining Methods
    Wu, Xiaodan
    Wang, Yunfeng
    Chu, Chao-Hsien
    Liu, Fengli
    Chen, Ping
    Yue, Dianmin
    PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2006, SECTIONS 1-8, 2006, : 167 - +