A k-anonymous rule clustering approach for data publishing

被引:1
|
作者
Ohki M. [1 ]
Inuiguchi M. [1 ]
机构
[1] Osaka University, 1-3 Machikaneyama, Toyonaka, Osaka
来源
| 1600年 / Fuji Technology Press卷 / 21期
关键词
Clustering; Decision rule; K-anonymity; Similarity;
D O I
10.20965/jaciii.2017.p0980
中图分类号
学科分类号
摘要
Classification rules should be open for public inspection to ensure fairness. These rules can be originally induced from some dataset. If induced classification rules are supported only by a small number of objects in the dataset, publication can lead to identification of objects supporting the rule, given their speciality. Eventually, it is possible to retrieve information about the identified objects. This identifiability is not desirable in terms of data privacy. In this paper, to avoid such privacy breaches, we propose rule clustering for achieving k-anonymity of all induced rules, i.e., the induced rules are supported by at least k objects in the dataset. The proposed approach merges similar rules to satisfy k-anonymity while aiming to maintain the classification accuracy. Two numerical experiments were executed to verify both the accuracy of the classifier with the rules obtained by the proposed method and the ratio of decision classes revealed from leaked information about objects. The experimental results show the usefulness of the proposed method.
引用
收藏
页码:980 / 988
页数:8
相关论文
共 50 条
  • [21] An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers
    Rebollo-Monedero, David
    Forne, Jordi
    Soriano, Miguel
    DATA & KNOWLEDGE ENGINEERING, 2011, 70 (10) : 892 - 921
  • [22] k-ARQ: k-Anonymous Ranking Queries
    Jung, Eunjin
    Ahn, Sukhyun
    Hwang, Seung-won
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT I, PROCEEDINGS, 2010, 5981 : 414 - +
  • [23] A new k-anonymous message transmission protocol
    Yao, G
    Feng, DG
    INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 388 - 399
  • [24] K-Anonymous Privacy Preserving Manifold Learning
    Garg, Sonakshi
    Torra, Vicenc
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 37 - 48
  • [25] K-anonymous path privacy on social graphs
    Wang, Shyue-Liang
    Tsai, Zheng-Ze
    Ting, I-Hsien
    Hong, Tzung-Pei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2014, 26 (03) : 1191 - 1199
  • [26] Secure distributed k-anonymous pattern mining
    Jiang, Wei
    Atzori, Maurizio
    ICDM 2006: SIXTH INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2006, : 319 - 329
  • [27] Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach
    Liu, Cheng
    Tian, Youliang
    Xiong, Jinbo
    Lu, Yanhua
    Li, Qiuxian
    Peng, Changgen
    IEEE ACCESS, 2019, 7 : 156025 - 156032
  • [28] A modification of the Lloyd algorithm for k-anonymous quantization
    Rebollo-Monedero, David
    Forne, Jordi
    Pallares, Esteve
    Parra-Arnau, Javier
    INFORMATION SCIENCES, 2013, 222 : 185 - 202
  • [29] An improved k-anonymous message transmission protocol
    School of Computer Sci., Xidian Univ., Xi'an 710071, China
    不详
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban), 2007, 2 (145-149):
  • [30] k-Anonymous microaggregation with preservation of statistical dependence
    Rebollo-Monedero, David
    Forne, Jordi
    Soriano, Miguel
    Puiggali Allepuz, Jordi
    INFORMATION SCIENCES, 2016, 342 : 1 - 23