Privacy Gain Based Multi-Iterative k-Anonymization to Protect Respondents Privacy

نویسندگان

  • Hitesh Chhinkaniwala
  • Sanjay Garg
چکیده

Huge volume of data from domain specific applications such as medical, financial, telephone, shopping records and individuals are regularly generated. Sharing of these data is proved to be beneficial for data mining application. Since data mining often involves data that contains personally identifiable information and therefore releasing such data may result in privacy breaches. On one hand such data is an important asset to business decision making by analyzing it. On the other hand data privacy concerns may prevent data owners from sharing information for data analysis. In order to share data while preserving privacy, data owner must come up with a solution which achieves the dual goal of privacy preservation as well as accuracy of data mining task mainly clustering and classification. Privacy Preserving Data Publishing (PPDP) is a study of eliminating privacy threats like linkage attack while preserving data utility by anonymizing data set before publishing. Proposed work is an extension to kanonymization where Privacy Gain (PrGain) has been computed for selective anonymization for set of tuples. Classification and clustering characteristics of original data and anonymized data using proposed algorithm have been evaluated in terms of information loss, execution time, and privacy achieved. Algorithm has been processed against standard data sets and analysis shows that values for sensitive attributes are being preserved with minimal information loss. Keywords—Data Mining; Data Privacy; kAnonymization; Privacy Gain;

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Preserving By Anonymization Techniques for Collaborative Data Publishing

This paper mainly deals with the issue of privacy preserving in data mining while collaborating n number of parties and trying to maintain confidentiality of all data providers details while collaborating their database. Here two type of attacks are addressed “insider attack” and “outsider attack”. In insider attack, the data providers use their own records and try to retrieve other data provid...

متن کامل

Privacy-Preserving For Collaborative Data Publishing

This paper mainly deals with the issue of privacy preserving in data mining while collaborating n number of parties and trying to maintain confidentiality of all data providers details while collaborating their database. Here two type of attacks are addressed “insider attack” and “outsider attack”. In insider attack, the data providers use their own records and try to retrieve other data provid...

متن کامل

D2Pt: Privacy-Aware Multiparty Data Publication

Today, publication of medical data faces high legal barriers. On the one hand, publishing medical data is important for medical research. On the other hand, it is neccessary to protect peoples’ privacy by ensuring that the relationship between individuals and their related medical data remains unknown to third parties. Various data anonymization techniques remove as little identifying informati...

متن کامل

Information based data anonymization for classification utility

Article history: Received 27 September 2010 Received in revised form 10 April 2011 Accepted 5 July 2011 Available online 22 July 2011 Anonymization is a practical approach to protect privacy in data. The major objective of privacy preserving data publishing is to protect private information in data whereas data is still useful for some intended applications, such as building classification mode...

متن کامل

Identifying Unsafe Routes for Network-Based Trajectory Privacy

In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. The privacy model has been implemented as a framework that (i) reconstructs the user movement from a series of independent location updates, (ii) identifies routes where user privacy is at risk, and (iii) anonymizes on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1403.5250  شماره 

صفحات  -

تاریخ انتشار 2013