A k-anonymous rule clustering approach for data publishing

被引:1
|
作者
Ohki M. [1 ]
Inuiguchi M. [1 ]
机构
[1] Osaka University, 1-3 Machikaneyama, Toyonaka, Osaka
来源
| 1600年 / Fuji Technology Press卷 / 21期
关键词
Clustering; Decision rule; K-anonymity; Similarity;
D O I
10.20965/jaciii.2017.p0980
中图分类号
学科分类号
摘要
Classification rules should be open for public inspection to ensure fairness. These rules can be originally induced from some dataset. If induced classification rules are supported only by a small number of objects in the dataset, publication can lead to identification of objects supporting the rule, given their speciality. Eventually, it is possible to retrieve information about the identified objects. This identifiability is not desirable in terms of data privacy. In this paper, to avoid such privacy breaches, we propose rule clustering for achieving k-anonymity of all induced rules, i.e., the induced rules are supported by at least k objects in the dataset. The proposed approach merges similar rules to satisfy k-anonymity while aiming to maintain the classification accuracy. Two numerical experiments were executed to verify both the accuracy of the classifier with the rules obtained by the proposed method and the ratio of decision classes revealed from leaked information about objects. The experimental results show the usefulness of the proposed method.
引用
收藏
页码:980 / 988
页数:8
相关论文
共 50 条
  • [41] K-anonymous location privacy protection scheme for the mobile terminal
    Song C.
    Jin T.
    Ni S.
    He J.
    Du S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 138 - 145
  • [42] On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS
    Dewri, Rinku
    Ray, Indrakshi
    Ray, Indrajit
    Whitley, Darrell
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2010, 50 : 71 - +
  • [43] Computational improvements in parallelized k-anonymous microaggregation of large databases
    Mohamad Mezher, Ahmad
    Garcia Alvarez, Alejandro
    Rebollo-Monedero, David
    Forne, Jordi
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, : 258 - 264
  • [44] KDST: K-Anonymous Node Discovery Using Separation of Trust
    Kabeel, Ali
    Elmougy, Amr
    PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, : 343 - 346
  • [45] Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search notes
    Stokes, Klara
    Farras, Oriol
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (03) : 503 - 524
  • [46] Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search notes
    Klara Stokes
    Oriol Farràs
    Designs, Codes and Cryptography, 2014, 71 : 503 - 524
  • [47] Does k-Anonymous Microaggregation Affect Machine-Learned Macrotrends?
    Rodriguez-Hoyos, Ana
    Estrada-Jimenez, Jose
    Rebollo-Monedero, David
    Parra-Arnau, Javier
    Forne, Jordi
    IEEE ACCESS, 2018, 6 : 28258 - 28277
  • [48] HyperNet: A conditional k-anonymous and censorship resistant decentralized hypermedia architecture
    Nunez-Gomez, Carlos
    Garcia-Font, Victor
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 208
  • [49] Publishing anonymous survey rating data
    Xiaoxun Sun
    Hua Wang
    Jiuyong Li
    Jian Pei
    Data Mining and Knowledge Discovery, 2011, 23 : 379 - 406
  • [50] The Fast Maximum Distance to Average Vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data
    Rodriguez-Hoyos, Ana
    Estrada-Jimenez, Jose
    Rebollo-Monedero, David
    Mohamad Mezher, Ahmad
    Parra-Arnau, Javier
    Forne, Jordi
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2020, 90