Skip to main content

2015 | OriginalPaper | Buchkapitel

Anonymizing Classification Data for Preserving Privacy

verfasst von : Sarat kr. Chettri, B. Borah

Erschienen in: Security in Computing and Communications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Classification of data with privacy preservation is a fundamental problem in privacy preserving data mining. The privacy goal requires concealing the sensitive information that may identify certain individuals breaching their privacy, whereas the classification goal requires to accurately classifying the data. One way to achieve both is to anonymize the dataset that contains the sensitive information of individuals before getting it released for data analysis. Microaggregation is an efficient privacy preservation technique used by statistical disclosure control community as well as data mining community to anonymize a dataset. It naturally satisfies k-anonymity without resorting to generalisations or suppression of data. In this paper we propose a new method named Microaggregation based Classification Tree (MiCT). In MiCT method data are perturbed prior to its classification and we use tree properties to achieve the objective of privacy preserving classification of data. To evaluate the effectiveness of the proposed method we have conducted experiments on real life data and proved that our method provides improved classification accuracy by preserving privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aggarwal, C.C., Pei, J., Zhang, B.: On privacy preservation against adversarial data mining. In: 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 2006, pp. 501–516. ACM Press, New York (2006) Aggarwal, C.C., Pei, J., Zhang, B.: On privacy preservation against adversarial data mining. In: 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 2006, pp. 501–516. ACM Press, New York (2006)
2.
Zurück zum Zitat Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl. Based Syst. 10(5), 1–14 (2002) Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl. Based Syst. 10(5), 1–14 (2002)
3.
Zurück zum Zitat Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: a data mining solution to privacy protection. In: 4th IEEE International Conference on Data Mining, pp. 205–216 (2004) Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: a data mining solution to privacy protection. In: 4th IEEE International Conference on Data Mining, pp. 205–216 (2004)
4.
Zurück zum Zitat Iyengar, S.V.: Transforming data to satisfy privacy constraints. In: 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 279–288. ACM Press, New York (2002) Iyengar, S.V.: Transforming data to satisfy privacy constraints. In: 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 279–288. ACM Press, New York (2002)
5.
Zurück zum Zitat Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 571–588 (2002). World Scientific SingaporeMathSciNetCrossRefMATH Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 571–588 (2002). World Scientific SingaporeMathSciNetCrossRefMATH
6.
Zurück zum Zitat Fayyoumi, E.: A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases. Softw. Pract. Experience 40, 1161–1188 (2010)CrossRef Fayyoumi, E.: A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases. Softw. Pract. Experience 40, 1161–1188 (2010)CrossRef
7.
Zurück zum Zitat Chettri, S.K., Borah, B.: MDAV2K : a variable-size microaggregation technique for privacy preservation. In: International Conference on Information Technology Convergence and Services, Bangalore, pp. 105–118 (2012) Chettri, S.K., Borah, B.: MDAV2K : a variable-size microaggregation technique for privacy preservation. In: International Conference on Information Technology Convergence and Services, Bangalore, pp. 105–118 (2012)
8.
Zurück zum Zitat Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: 21st IEEE International Conference on Data Engineering (ICDE 2005), Tokyo, Japan, pp. 205–216 (2005) Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: 21st IEEE International Conference on Data Engineering (ICDE 2005), Tokyo, Japan, pp. 205–216 (2005)
9.
Zurück zum Zitat Fung, B.C.M., Wang, K., Yu, P.S.: Anonymizing classification data for privacy preservation. IEEE Trans. Knowl. Data Eng. 19(5), 711–725 (2007)CrossRef Fung, B.C.M., Wang, K., Yu, P.S.: Anonymizing classification data for privacy preservation. IEEE Trans. Knowl. Data Eng. 19(5), 711–725 (2007)CrossRef
10.
Zurück zum Zitat Friedman, A., Wolff, R., Schuster, A.: Providing k-anonymity in data mining. Int. J. Very Large Data Bases 17(4), 789–804 (2008)CrossRef Friedman, A., Wolff, R., Schuster, A.: Providing k-anonymity in data mining. Int. J. Very Large Data Bases 17(4), 789–804 (2008)CrossRef
11.
Zurück zum Zitat Sharkey, P., Tian, H., Zhang, W., Xu, S.: Privacy-preserving data mining through knowledge model sharing. In: Bonchi, F., Malin, B., Saygın, Y. (eds.) PInKDD 2007. LNCS, vol. 4890, pp. 97–115. Springer, Heidelberg (2008)CrossRef Sharkey, P., Tian, H., Zhang, W., Xu, S.: Privacy-preserving data mining through knowledge model sharing. In: Bonchi, F., Malin, B., Saygın, Y. (eds.) PInKDD 2007. LNCS, vol. 4890, pp. 97–115. Springer, Heidelberg (2008)CrossRef
12.
Zurück zum Zitat Kisilevich, S., Elovici, Y., Shapira, B., Rokach, L.: Efficient multidimensional suppression for k-anonymity. IEEE Trans. Knowl. Data Eng. 22(3), 334–347 (2010)CrossRef Kisilevich, S., Elovici, Y., Shapira, B., Rokach, L.: Efficient multidimensional suppression for k-anonymity. IEEE Trans. Knowl. Data Eng. 22(3), 334–347 (2010)CrossRef
13.
Zurück zum Zitat Kisilevich, S., Elovici, Y., Shapira, B., Rokach, L.: kACTUS 2: privacy preserving in classification tasks using k-anonymity. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds.) Protecting Persons While Protecting the People. LNCS, vol. 5661, pp. 63–81. Springer, Heidelberg (2009)CrossRef Kisilevich, S., Elovici, Y., Shapira, B., Rokach, L.: kACTUS 2: privacy preserving in classification tasks using k-anonymity. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds.) Protecting Persons While Protecting the People. LNCS, vol. 5661, pp. 63–81. Springer, Heidelberg (2009)CrossRef
14.
Zurück zum Zitat Chettri, S.K., Borah, B.: An efficient microaggregation method for protecting mixed data. In: Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) Computer Networks and Communications (NetCom). LNEE, vol. 131, pp. 551–561. Springer, New York (2013)CrossRef Chettri, S.K., Borah, B.: An efficient microaggregation method for protecting mixed data. In: Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) Computer Networks and Communications (NetCom). LNEE, vol. 131, pp. 551–561. Springer, New York (2013)CrossRef
16.
Zurück zum Zitat Pagliuca, D.: Some results of individual ranking method on the system of enterprise accounts annual survey. Esprit SDC Project, Deliverable MI-3/ D (1999) Pagliuca, D.: Some results of individual ranking method on the system of enterprise accounts annual survey. Esprit SDC Project, Deliverable MI-3/ D (1999)
17.
Zurück zum Zitat Domingo-Ferrer, J., Martinez-Balleste, A., Mateo-sanz, J.M., Sebé, F.: Efficient multivariate data-oriented microaggregation. VLDB J. 15(4), 355–369 (2006)CrossRef Domingo-Ferrer, J., Martinez-Balleste, A., Mateo-sanz, J.M., Sebé, F.: Efficient multivariate data-oriented microaggregation. VLDB J. 15(4), 355–369 (2006)CrossRef
Metadaten
Titel
Anonymizing Classification Data for Preserving Privacy
verfasst von
Sarat kr. Chettri
B. Borah
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-22915-7_10