Disclosure Limitation of Sensitive Rules

نویسندگان

  • M. Atallah
  • E. Bertino
  • A. Elmagarmid
  • M. Ibrahim
  • V. Verykios
چکیده

Data products (macrodata or tabular data and microdat a or raw data records), are designed to inform public or bus iness policy, and research or public information. Securi ng these products against unauthorized acces ses has been a long-term goal of the database security research comm unity and the government statistical agencies. Solutions t o this problem require combining several techniques and m echanisms. Recen t advances in data mining and machine l earning algorithms have, however, increased the security r isks one may incur when releasing data for mining from out side parties. Issues related to data mining and security hav e been recognized and investigated only recen tly. T his paper, deals with the problem of limiting disclosure o f sensitive rules. In particular, it is attempted to select ively hide some frequent itemsets from large databases with as little as possible impact on other, non-sensitive frequent i temsets. Frequent itemsets are sets of items that appear in the database “frequently enough” and identifying them is usually the first step toward association/correlation rule or sequential pattern mining. Experimental results are pres ented along with some theoretical issues related to this pr oblem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hiding Association Rules by Using Conndence and Support

Large repositories of data contain sensitive information which must be protected against unauthorized access. The protection of the conndentiality of this information has been a long-term goal for the database security research community and the government statistical agencies. Recent advances, in data mining and machine learning algorithms, have increased the disclosure risks one may encounter...

متن کامل

Hiding Association Rules by Using Confidence and Support

Large repositories of data contain sensitive information which must be protected against unauthorized access. The protection of the confidentiality of tills information has been a long-term goal for the database security research community and the government statistical agencies. Recent advances, in data mining and machine learning algorithms, have increased the disclosure risks one may encount...

متن کامل

Introducing an algorithm for use to hide sensitive association rules through perturb technique

Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...

متن کامل

Local synthesis for disclosure limitation that satisfies probabilistic k-anonymity criterion

Before releasing databases which contain sensitive information about individuals, data publishers must apply Statistical Disclosure Limitation (SDL) methods to them, in order to avoid disclosure of sensitive information on any identifiable data subject. SDL methods often consist of masking or synthesizing the original data records in such a way as to minimize the risk of disclosure of the sensi...

متن کامل

A Critique of the Sensitivity Rules Usually Employed for Statistical Table Protection

In statistical disclosure control of tabular data, sensitivity rules are commonly used to decide whether a table cell is sensitive and should therefore not be published. The most popular sensitivity rules are the dominance rule, the p%-rule and the pq-rule. The dominance rule has received critiques based on specific numerical examples and is being gradually abandoned by leading statistical agen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999