Author:
Ohki Motoyuki, ,Inuiguchi Masahiro
Abstract
Classification rules should be open for public inspection to ensure fairness.These rules can be originally induced from some dataset. If induced classification rules are supported only by a small number of objects in the dataset, publication can lead to identification of objects supporting the rule, given their speciality. Eventually, it is possible to retrieve information about the identified objects. This identifiability is not desirable in terms of data privacy.In this paper, to avoid such privacy breaches, we propose rule clustering for achievingk-anonymity of all induced rules, i.e., the induced rules are supported by at leastkobjects in the dataset. The proposed approach merges similar rules to satisfyk-anonymity while aiming to maintain the classification accuracy. Two numerical experiments were executed to verify both the accuracy of the classifier with the rules obtained by the proposed method and the ratio of decision classes revealed from leaked information about objects. The experimental results show the usefulness of the proposed method.
Publisher
Fuji Technology Press Ltd.
Subject
Artificial Intelligence,Computer Vision and Pattern Recognition,Human-Computer Interaction
Reference20 articles.
1. L. Sweeney, “k-Anonymity: A Model for Protecting Privacy,” Int. J. on Uncertainty Fuzziness and Knowledge-based System, Vol.10, No.5, pp. 557-570, 2002.
2. R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules,” VLDB ’94 Proc. of the 20th Int. Conf. on Very Large Data Bases, pp. 487-499, 1994.
3. C. H. Tai, P. S.Yu, and M. S. Chen, “k-Support Anonymity Based on Pseudo Taxonomy for Outsourcing of Frequent Itemset Mining,” Proc. of the 16th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 473-482, 2010.
4. Z. Zhu and W. Du, “K-anonymous association rule hiding,” Proc. of the 5th ACM Symp. on Information, Computer and Communications Security, pp. 305-309, 2010.
5. J. G. Narges and N. D. Mohammad, “A survey on privacy preserving association rule mining,” Advances in Computer Science: an Int. J., Vol.4, No.14, pp. 41-48, 2015.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An efficient privacy-preserving approach for data publishing;Journal of Ambient Intelligence and Humanized Computing;2021-08-03
2. Utilization of Imprecise Rules for Privacy Protection;Lecture Notes in Computer Science;2019
3. Fundations of Decision Rule Induction: Covering Algorithms;Journal of Japan Society for Fuzzy Theory and Intelligent Informatics;2018-08-15