The K-Anonymity Approach in Preserving the Privacy of E-Services that Implement Data Mining

نویسندگان

  • Ion LUNGU
  • Alexandru PIRJAN
چکیده

In this paper, we first described the concept of k-anonymity and different approaches of its implementation, by formalizing the main theoretical notions. Afterwards, we have analyzed, based on a practical example, how the k-anonymity approach applies to the data-mining process in order to protect the identity and privacy of clients to whom the data refers. We have presented the most important techniques and algorithms used in order to enforce kanonymity. We have studied possible approaches to ensure that k-anonymity preserves the privacy of the data mining process in order to assure an efficient, safe and effective data mining delivery as an e-service. We have depicted several software implementations that employ k-anonymity. We have developed, using the Compute Unified Device Architecture, an algorithm that analyzes k-anonymity and is suitable for extracting tuples with the same quasiidentifying values from a large database structured as a private table.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Preserving Data Mining in Electronic Health Record using K- anonymity and Decision Tree

In this paper, we present an accurate and efficient privacy preserving data mining technique in Electronic Health Record (EHR) by using k –anonymity and decision tree C4.5 that is useful to generate pattern for medical research or any clinical trials. It is analyzed that anonymization offers better privacy rather than other privacy preserving method like that randomization, cryptography, pertur...

متن کامل

Hybrid Approach for Data Publishing Using Privacy Preservation Techniques

Now a day’s governmental and nongovernmental organization wants to share their information for the purpose of knowledge discovery. When the data’s are shared individuals personal data or sensitive data which should not be known to others. Eg. Medical record, voters list, census data. This may leads a latest research field called Privacy preserving data mining. To address these issues, released ...

متن کامل

Privacy-preserving data mining: A feature set partitioning approach

In privacy-preserving data mining (PPDM), a widely used method for achieving data mining goals while preserving privacy is based on k-anonymity. This method, which protects subject-specific sensitive data by anonymizing it before it is released for data mining, demands that every tuple in the released table should be indistinguishable from no fewer than k subjects. The most common approach for ...

متن کامل

Privacy Preserving Updates to Sliced Anonymous Data Bases

Privacy is the main concern in the present world. Privacy is becoming an increasingly important issue in many data mining applications in various fields like medical research, intelligence agencies, hospital records maintenance etc. Suppose there exsists an anonymous database (e.g. containing medical records) then the objectives include how to still preserve the privacy while updates are being ...

متن کامل

k -Anonymous Data Mining: A Survey

Data mining technology has attracted significant interest as a means of identifying patterns and trends from large collections of data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. Privacy protection in data mining is then becoming a crucial issue that has captured the atte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011