Sensitive Attributes based Privacy Preserving in Data Mining using k-anonymity

نویسندگان

  • G. Loukides
  • A. Gkoulalas-Divanis
  • Batya Kenig
  • Tamir Tassa
  • Charu Aggarwal
  • John Miller
  • Alina Campan
  • Traian Marius Truta
چکیده

Data mining is the process of extracting interesting patterns or knowledge from huge amount of data. In recent years, there has been a tremendous growth in the amount of personal data that can be collected and analyzed by the organizations. Organizations such as credit card companies, real estate companies and hospitals collect and hold large volumes of data for their research purposes. E. g. National Institute of health. When these organizations publish data containing a lot of sensitive information. The importance of sharing data for research and knowledge discovery has been well-recognized. However, sharing data that contains sensitive personal information, such as insurance data, medical record, etc across organization boundaries can raise serious privacy concerns. There is a need to preserve the privacy of the individuals in data set . K-anonymity is one of the easy and efficient techniques to achieve privacy in many data publishing applications. In k-anonymity, all tuples of releasing database are generalized to make it anonymize which lead to data utility reduction and more information loss of publishing table. Sensitive attribute based anonymity method is very useful in preserving the privacy of individuals in organization's publication of data. It reduces information loss to the researchers by providing sensitive levels. This method also avoids Homogeneity attack and Background attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiple Sensitive Attributes based Privacy Preserving Data Mining using k-Anonymity

Data mining is the process of extracting interesting patterns or knowledge from large amount of data. With the development of Data mining technology, an increasing number of data can be mined out to reveal some potential information about the user, because of which privacy of the user may be violated easily. Privacy Preserving Data Mining is used to mine the potential valuable knowledge without...

متن کامل

A Novel Anonymity Algorithm for Privacy Preserving in Publishing Multiple Sensitive Attributes

Publishing the data with multiple sensitive attributes brings us greater challenge than publishing the data with single sensitive attribute in the area of privacy preserving. In this study, we propose a novel privacy preserving model based on k-anonymity called (α, β, k)-anonymity for databases. (α, β, k)anonymity can be used to protect data with multiple sensitive attributes in data publishing...

متن کامل

Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model

In privacy preserving data mining, anonymization based approaches have been used to preserve the privacy of an individual. Existing literature addresses various anonymization based approaches for preserving the sensitive private information of an individual. The k-anonymity model is one of the widely used anonymization based approach. However, the anonymization based approaches suffer from the ...

متن کامل

Privacy-preserving data mining: A feature set partitioning approach

In privacy-preserving data mining (PPDM), a widely used method for achieving data mining goals while preserving privacy is based on k-anonymity. This method, which protects subject-specific sensitive data by anonymizing it before it is released for data mining, demands that every tuple in the released table should be indistinguishable from no fewer than k subjects. The most common approach for ...

متن کامل

Research on Privacy Preserving on K-anonymity

The disclosure of sensitive information has become prominent nowadays; privacy preservation has become a research hotspot in the field of data security. Among all the algorithms of privacy preservation in data mining, K-anonymity is a kind of common and valid algorithm in privacy preservation, which can effectively prevent the loss of sensitive information under linking attacks, and it is widel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016