The K-Anonymity Approach in Preserving the Privacy of E-Services that Implement Data Mining
نویسندگان
چکیده
In this paper, we first described the concept of k-anonymity and different approaches of its implementation, by formalizing the main theoretical notions. Afterwards, we have analyzed, based on a practical example, how the k-anonymity approach applies to the data-mining process in order to protect the identity and privacy of clients to whom the data refers. We have presented the most important techniques and algorithms used in order to enforce kanonymity. We have studied possible approaches to ensure that k-anonymity preserves the privacy of the data mining process in order to assure an efficient, safe and effective data mining delivery as an e-service. We have depicted several software implementations that employ k-anonymity. We have developed, using the Compute Unified Device Architecture, an algorithm that analyzes k-anonymity and is suitable for extracting tuples with the same quasiidentifying values from a large database structured as a private table.
منابع مشابه
Privacy Preserving Data Mining in Electronic Health Record using K- anonymity and Decision Tree
In this paper, we present an accurate and efficient privacy preserving data mining technique in Electronic Health Record (EHR) by using k –anonymity and decision tree C4.5 that is useful to generate pattern for medical research or any clinical trials. It is analyzed that anonymization offers better privacy rather than other privacy preserving method like that randomization, cryptography, pertur...
متن کاملHybrid Approach for Data Publishing Using Privacy Preservation Techniques
Now a day’s governmental and nongovernmental organization wants to share their information for the purpose of knowledge discovery. When the data’s are shared individuals personal data or sensitive data which should not be known to others. Eg. Medical record, voters list, census data. This may leads a latest research field called Privacy preserving data mining. To address these issues, released ...
متن کاملPrivacy-preserving data mining: A feature set partitioning approach
In privacy-preserving data mining (PPDM), a widely used method for achieving data mining goals while preserving privacy is based on k-anonymity. This method, which protects subject-specific sensitive data by anonymizing it before it is released for data mining, demands that every tuple in the released table should be indistinguishable from no fewer than k subjects. The most common approach for ...
متن کاملPrivacy Preserving Updates to Sliced Anonymous Data Bases
Privacy is the main concern in the present world. Privacy is becoming an increasingly important issue in many data mining applications in various fields like medical research, intelligence agencies, hospital records maintenance etc. Suppose there exsists an anonymous database (e.g. containing medical records) then the objectives include how to still preserve the privacy while updates are being ...
متن کاملk -Anonymous Data Mining: A Survey
Data mining technology has attracted significant interest as a means of identifying patterns and trends from large collections of data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. Privacy protection in data mining is then becoming a crucial issue that has captured the atte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011