An evolutionary approach to enhance data privacy

نویسندگان

  • Javier Jiménez
  • Jordi Marés
  • Vicenç Torra
چکیده

Dissemination of data with sensitive information about individuals has an implicit risk of unauthorized disclosure. Perturbative masking methods propose the distortion of the original data sets before publication, tackling a difficult tradeoff between data utility (low information loss) and protection against disclosure (low disclosure risk). In this paper we describe how information loss and disclosure risk measures can be integrated within an evolutionary algorithm to seek new and enhanced masking protections for continuous microdata. The proposed technique constitutes a hybrid approach that combines state-of-the-art protection methods with an evolutionary algorithm optimization. We also provide experimental results using three data sets in order to illustrate and empirically evaluate the application of this technique. URL http://www.springerlink.com/content/42357225707508x2/ [6] Source URL: https://www.iiia.csic.es/en/node/53978 Links [1] https://www.iiia.csic.es/en/bibliography?f[author]=210 [2] https://www.iiia.csic.es/en/staff/jordi-mar%C3%A9s [3] https://www.iiia.csic.es/en/staff/vicen%C3%A7-torra [4] https://www.iiia.csic.es/en/bibliography?f[keyword]=519 [5] https://www.iiia.csic.es/en/bibliography?f[keyword]=518 [6] http://www.springerlink.com/content/42357225707508x2/

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

مطالعه‌ای مروری بر حفظ حریم بیماران

The concept of privacy, which is used in many disciplines, is a basic human need and also is recognized as an important concept in nursing. The concept of privacy has been described in various dimensions including physical, psychological, social and informational privacy. In this article we review these dimensions. Most of the studies related to the privacy have been carried out in the area of...

متن کامل

Predicting ε50 for Lateral Behavior of Piles in Marine Clay Using an Evolutionary Based Approach

Analyzing piles subjected to lateral loads significantly depends on soil resistance at any point along the pile as a function of pile deflection, known as p-y curve. On the other hand, the deformation characteristics of soil defined as “the soil strain at 50% of maximum deviatoric stress (ε50)” has considerable effect on the generated p-y curve. In this research, several models are proposed to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Soft Comput.

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2011