DocumentCode :
2142838
Title :
k-Anonymized Reducts
Author :
Rokach, Lior ; Schclar, Alon
Author_Institution :
Dept. of Inf. Syst. Eng., Ben-Gurion Univ. of the Negev, Beer-Sheva, Israel
fYear :
2010
fDate :
14-16 Aug. 2010
Firstpage :
392
Lastpage :
395
Abstract :
Privacy preserving data mining aims to prevent the violation of privacy that might result from mining of sensitive data. This is commonly achieved by data anonymization. One way to anonymize data is adherence to the k-anonymity concept which requires that the probability to identify an individual by linking databases not to exceed 1/k. In this paper we propose an algorithm which utilizes rough set theory to achieve k-anonymity. The basic idea is to partition the original dataset into several disjoint reducts such that each one of them adheres to k-anonymity. We show that it is easier to make each reduct comply with k-anonymity if it does not contain all quasi-identifier attributes. Moreover, our procedure ensures that even if the attacker attempts to rejoin the reducts, the k-anonymity is still preserved.
Keywords :
data mining; data privacy; rough set theory; data anonymization; k-anonymized reducts; privacy preserving data mining; rough set theory; Accuracy; Approximation methods; Classification algorithms; Data privacy; Set theory; Training; k-anonimity; reducts; rough set theory;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Granular Computing (GrC), 2010 IEEE International Conference on
Conference_Location :
San Jose, CA
Print_ISBN :
978-1-4244-7964-1
Type :
conf
DOI :
10.1109/GrC.2010.162
Filename :
5575944
Link To Document :
بازگشت