A k-anonymous rule clustering approach for data publishing

被引:1
|
作者
Ohki M. [1 ]
Inuiguchi M. [1 ]
机构
[1] Osaka University, 1-3 Machikaneyama, Toyonaka, Osaka
来源
| 1600年 / Fuji Technology Press卷 / 21期
关键词
Clustering; Decision rule; K-anonymity; Similarity;
D O I
10.20965/jaciii.2017.p0980
中图分类号
学科分类号
摘要
Classification rules should be open for public inspection to ensure fairness. These rules can be originally induced from some dataset. If induced classification rules are supported only by a small number of objects in the dataset, publication can lead to identification of objects supporting the rule, given their speciality. Eventually, it is possible to retrieve information about the identified objects. This identifiability is not desirable in terms of data privacy. In this paper, to avoid such privacy breaches, we propose rule clustering for achieving k-anonymity of all induced rules, i.e., the induced rules are supported by at least k objects in the dataset. The proposed approach merges similar rules to satisfy k-anonymity while aiming to maintain the classification accuracy. Two numerical experiments were executed to verify both the accuracy of the classifier with the rules obtained by the proposed method and the ratio of decision classes revealed from leaked information about objects. The experimental results show the usefulness of the proposed method.
引用
收藏
页码:980 / 988
页数:8
相关论文
共 50 条
  • [1] k-Anonymous data collection
    Zhong, Sheng
    Yang, Zhiqiang
    Chen, Tingting
    INFORMATION SCIENCES, 2009, 179 (17) : 2948 - 2963
  • [2] MULTIPLE RELEASES OF k-ANONYMOUS DATA SETS AND k-ANONYMOUS RELATIONAL DATABASES
    Stokes, Klara
    Torra, Vicenc
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2012, 20 (06) : 839 - 853
  • [3] k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering
    Zhang Q.
    Ye A.
    Ye G.
    Deng H.
    Chen A.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (07): : 1625 - 1635
  • [4] Finding the Provenance of k-anonymous Data and Adding it to Association-rule Mining
    Liu Yilong
    Liu Guohua
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 117 - 122
  • [5] Generating k-Anonymous Microdata by Fuzzy Possibilistic Clustering
    Abidi, Balkis
    Ben Yahia, Sadok
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT II, 2017, 10439 : 3 - 17
  • [6] Current Developments of k-Anonymous Data Releasing
    Li, Jiuyong
    Wang, Hua
    Jin, Huidong
    Yong, Jianming
    ELECTRONIC JOURNAL OF HEALTH INFORMATICS, 2008, 3 (01):
  • [7] Utility Evaluation of K-anonymous Data by Microaggregation
    Wang Lixia
    Han Jianmin
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 381 - +
  • [8] K-Anonymous patterns
    Atzori, M
    Bonchi, F
    Giannotti, F
    Pedreschi, D
    KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2005, 2005, 3721 : 10 - 21
  • [9] Similarity-based privacy protection for publishing k-anonymous trajectories
    Wang, Shuai
    Chen, Chunyi
    Zhang, Guijie
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (03)
  • [10] Similarity-based privacy protection for publishing k-anonymous trajectories
    WANG Shuai
    CHEN Chunyi
    ZHANG Guijie
    Frontiers of Computer Science, 2022, 16 (03)