Constrained Microaggregation: Adding Constraints for Data Editing

نویسنده

  • Vicenç Torra
چکیده

Privacy preserving data mining and statistical disclosure control have introduced several methods for data perturbation that can be used for ensuring the privacy of data respondents. Such methods, as rank swapping and microaggregation, perturbate the data introducing some kind of noise. Nevertheless, it is usual that data are edited with care after collection to remove inconsistencies, and such perturbation might cause the introduction of new inconsistencies to them. In this paper we study the development of methods for microaggregation that avoid the introduction of such inconsistencies. That is, methods that ensure the protected data to satisfy a set of given constraints.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Repeated Record Ordering for Constrained Size Clustering

One of the main techniques used in data mining is data clustering, which has many applications in computer science, biology, and social sciences. Constrained clustering is a type of clustering in which side information provided by the user is incorporated into current clustering algorithms. One of the well researched constrained clustering algorithms is called microaggregation. In a microaggreg...

متن کامل

A novel local search method for microaggregation

In this paper, we propose an effective microaggregation algorithm to produce a more useful protected data for publishing. Microaggregation is mapped to a clustering problem with known minimum and maximum group size constraints. In this scheme, the goal is to cluster n records into groups of at least k and at most 2k_1 records, such that the sum of the within-group squ...

متن کامل

Facility Location and Social Choice via Microaggregation

Microaggregation is a cardinality-constrained clustering problem that arose in the context of data privacy. In microaggregation, the number of clusters is not fixed beforehand, but each cluster must have at least k elements. We illustrate in this paper that microaggregation can be applied for decision making in areas other than privacy. Specifically, we focus on the service facility location pr...

متن کامل

Dealing with Edit Constraints in Microdata Protection: Microaggregation

In this paper we discuss how most edit constraints can be taken into account in an effective way through microaggregation. We discuss different edit constraints and some variations of microaggregation that permits to deal with such constraints. We will also present our software to formalize and deal with such constraints in an automatic way.

متن کامل

A Chance-Constrained DEA model with random input and output data:Considering maintenance groups of Iranian Aluminum Company

In this paper, we use an input oriented chance-constrained DEA model withrandom inputs and outputs. A super-eciency model with chance constraintsis used for ranking. However, for convenience in calculations a non-linear deterministicequivalent model is obtained to solve the models. The non-linearmodel is converted into a model with quadratic constraints to solve the nonlineardeterministic model...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Trans. Data Privacy

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2008