Controlling Inference: Avoiding P-level Reduction During Analysis

نویسندگان

  • Adepele Williams
  • Ken Barker
چکیده

This paper presents a concept hierarchy-based approach to privacy preserving data collection for data mining called the P-level model. The P-level model allows data providers to divulge information at any chosen privacy level (P-level), on any attribute. Data collected at a high P-level signifies divulgence at a higher conceptual level and thus ensures more privacy. Providing guarantees prior to release, such as satisfying k-anonymity (Samarati 2001; Sweeney 2002) , can further protect the collected data set from privacy breaches due to linking the released data set with external data sets. However, the data mining process, which involves the integration of various data values, can constitute a privacy breach if combinations of attributes at certain P-levels result in the inference of knowledge that exists at a lower P-level. This paper describes the P-level reduction phenomenon and proposes methods to identify and control the occurrence of this privacy breach. .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Network-based Fuzzy Inference System-Genetic Algorithm Models for Prediction Groundwater Quality Indices: a GIS-based Analysis

The prediction of groundwater quality is very important for the management of water resources and environmental activities. The present study has integrated a number of methods such as Geographic Information Systems (GIS) and Artificial Intelligence (AI) methodologies to predict groundwater quality in Kerman plain (including HCO3-, concentrations and Electrical Conductivity (EC) of groundwater)...

متن کامل

Distributed Rule - Based Inference in the Presence of Redundant Information

The problem of processing redundant information (also known as “double counting”) has been addressed in distributed Level 1 Fusion systems over the past decade. Some approaches for avoiding the ill-effects of processing redundant data include: tagging all data items with a unique identifier, controlling the flow of data throughout the network or tracking pedigree information for each data item....

متن کامل

The Effect of Implementation of a Pain Monitoring Protocol on the Pain Intensity in the Intensive Care Unit Semiconscious Patients

Background: Neglecting the pain assessment in intensive care unit (ICU) patients with decreased level of consciousness (LOC) can lead to inappropriate pain management. Implementation of a pain management protocol may contribute to avoiding such negligence. Aim: This study aimed to determine the effect of using a pain monitoring protocol on the pain intensity of ICU patients with decreased LOC. ...

متن کامل

Bayesian Learning of Phrasal Tree-to-String Templates

We examine the problem of overcoming noisy word-level alignments when learning tree-to-string translation rules. Our approach introduces new rules, and reestimates rule probabilities using EM. The major obstacles to this approach are the very reasons that word-alignments are used for rule extraction: the huge space of possible rules, as well as controlling overfitting. By carefully controlling ...

متن کامل

An alternative to null-hypothesis significance tests.

The statistic p(rep) estimates the probability of replicating an effect. It captures traditional publication criteria for signal-to-noise ratio, while avoiding parametric inference and the resulting Bayesian dilemma. In concert with effect size and replication intervals, p(rep) provides all of the information now used in evaluating research, while avoiding many of the pitfalls of traditional st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007