A k-anonymous rule clustering approach for data publishing

被引:1
|
作者
Ohki M. [1 ]
Inuiguchi M. [1 ]
机构
[1] Osaka University, 1-3 Machikaneyama, Toyonaka, Osaka
来源
| 1600年 / Fuji Technology Press卷 / 21期
关键词
Clustering; Decision rule; K-anonymity; Similarity;
D O I
10.20965/jaciii.2017.p0980
中图分类号
学科分类号
摘要
Classification rules should be open for public inspection to ensure fairness. These rules can be originally induced from some dataset. If induced classification rules are supported only by a small number of objects in the dataset, publication can lead to identification of objects supporting the rule, given their speciality. Eventually, it is possible to retrieve information about the identified objects. This identifiability is not desirable in terms of data privacy. In this paper, to avoid such privacy breaches, we propose rule clustering for achieving k-anonymity of all induced rules, i.e., the induced rules are supported by at least k objects in the dataset. The proposed approach merges similar rules to satisfy k-anonymity while aiming to maintain the classification accuracy. Two numerical experiments were executed to verify both the accuracy of the classifier with the rules obtained by the proposed method and the ratio of decision classes revealed from leaked information about objects. The experimental results show the usefulness of the proposed method.
引用
收藏
页码:980 / 988
页数:8
相关论文
共 50 条
  • [31] How anonymous is k-anonymous? Look at your quasi-ID
    Bettini, Claudio
    Wang, X. Sean
    Jajodia, Sushil
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 1 - +
  • [32] K-anonymous multi-party secret handshakes
    Xu, Shouhuai
    Yung, Moti
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 72 - +
  • [33] Local Differential Privacy with K-anonymous for Frequency Estimation
    Zhao, Dan
    Chen, Hong
    Zhao, Suyun
    Li, Cuiping
    Zhang, Xiaoying
    Liu, Ruixuan
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5819 - 5828
  • [34] Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis
    Rebollo Monedero, David
    Mohamad Mezher, Ahmad
    Casanova Colome, Xavier
    Forne, Jordi
    Soriano, Miguel
    INFORMATION SCIENCES, 2019, 503 : 417 - 443
  • [35] K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data
    Meng, Linghang
    Hong, Xueshu
    Chen, Yingwen
    Ding, Yuke
    Zhang, Chengzhuo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 381 - 393
  • [36] A New Method of Privacy Protection: Random k-Anonymous
    Song, Fagen
    Ma, Tinghuai
    Tian, Yuan
    Al-Rodhaan, Mznah
    IEEE ACCESS, 2019, 7 : 75434 - 75445
  • [37] The k-anonymity approach for data-publishing based on clustering partition
    Jiang, Huo-Wen
    Wang, Ye-Fu
    Xiong, Huan-Liang
    WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 423 - 428
  • [38] Efficient Algorithms for K-Anonymous Location Privacy in Participatory Sensing
    Khuong Vu
    Zheng, Rong
    Gao, Jie
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2399 - 2407
  • [39] k-Anonymous Microdata Release via Post Randomisation Method
    Ikarashi, Dai
    Kikuchi, Ryo
    Chida, Koji
    Takahashi, Katsumi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 225 - 241
  • [40] Privately updating suppression and generalization based k-anonymous databases
    Trombetta, Alberto
    Jiang, Wei
    Bertino, Elisa
    Bossi, Lorenzo
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 1370 - +