• English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • français 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Ouvrir une session
Voir le document 
  •   Accueil de DSpace
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • Voir le document
  •   Accueil de DSpace
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • Voir le document
JavaScript is disabled for your browser. Some features of this site may not work without it.
Tout DSpace
  • Communautés & Collections
  • Par date de publication
  • Auteurs
  • Titres
  • Sujets

A data perturbation approach to sensitive classification rule hiding

Thumbnail
Auteur
Delis, A.; Verykios, V. S.; Tsitsonis, A. A.
Date
2010
DOI
10.1145/1774088.1774216
Sujet
Categorical datasets
Classification algorithm
Classification rules
Cryptographic techniques
Current structure
Data perturbation
Data sets
Information value
Privacy preservation
Perturbation techniques
Classification (of information)
Afficher la notice complète
Résumé
This paper focuses on privacy preservation in classification rule mining. The subject at hand is approached through the proposition of a data perturbation approach for hiding sensitive classification rules in categorical datasets. Such a methodology is absolutely necessary in case the data needs to be published on the web so that it is amply available for public use as opposed to other approaches like output perturbation or cryptographic techniques that restrict the usability of the data in different ways. This methodology is based upon the unique characteristics of sequential covering classification algorithms. It modifies the tuples of sensitive rules of a dataset D in such a way that these are distributed to the "more important" non-sensitive rules. In addition it assures that the tuples belonging to the sensitive rules are assigned to the non-sensitive rules in proportion to their rank in the ruleset. In that way, it is ensured that not only the sensitive rules are hidden but also that the current structure of the ruleset, thus the information value of the dataset, is preserved. Moreover a modification of the basic method which exhibits an alternative distribution procedure is also presented. Finally, a series of experiments are executed in order to evaluate the validity and effectiveness of the proposed approaches against existing similar ones. © 2010 ACM.
URI
http://hdl.handle.net/11615/26982
Collections
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ. [19735]
htmlmap 

 

Parcourir

Tout DSpaceCommunautés & CollectionsPar date de publicationAuteursTitresSujetsCette collectionPar date de publicationAuteursTitresSujets

Mon compte

Ouvrir une sessionS'inscrire
Help Contact
DepositionAboutHelpContactez-nous
Choose LanguageTout DSpace
EnglishΕλληνικά
htmlmap