Abstract
In this paper, we utilize imprecise rules for privacy protection in the publication of data sets. We assume that data sets show the classification results with more than two classes. First k-anonymous imprecise rules are induced. Using several k-anonymous imprecise rules explaining an object, the object is replaced with several imprecise patterns corresponding to the k-anonymous imprecise rules which are common in at least k objects. In this way, privacy protected data tables are composed. The proposed data table is investigated by numerical experiments from its usefulness in rule induction as well as from its privacy protection ability. The results show that the proposed method will be satisfactorily useful.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)
Sweeney, L.: K-Anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)
Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79228-4_1
Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)
Yakoubov, S., Gadepally, V., Schear, N., Shen, E., Yerukhimovich, A.: A survey of cryptographic approaches to securing big-data analytics in the cloud. In: Proceedings of 2014 IEEE High Performance Extreme Computing Conference, pp. 1–6. IEEE Xplore (2014)
Fung, B.C.N., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), Article 14 (2010)
Pawlak, Z.: Rough sets. Int. J. Comput. Inf. Sci. 11(5), 341–356 (1982)
Zhou, Z., Huang, L., Yun, Y.: Privacy preserving attribute reduction based on rough set. In: Proceedings of 2nd International Workshop on Knowledge Discovery and Data Mining, WKKD 2009, pp. 202–206. AAAI, Portland, USA (2009)
Rokach, L., Schclar, A.: k-Anonymized reducts. In: Proceedings of 2010 IEEE International Conference on Granular Computing, pp. 392–395. IEEE Xplore (2010)
Ye, M., Wu, X., Hu, X., Hu, D.: Anonymizing classification data using rough set theory. Knowl. Based Syst. 43, 82–94 (2013)
Inuiguchi, M., Hamakawa, T., Ubukata, S.: Imprecise rules for data privacy. In: Ciucci, D., Wang, G., Mitra, S., Wu, W.-Z. (eds.) RSKT 2015. LNCS, vol. 9436, pp. 129–139. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25754-9_12
Ohki, M., Inuiguchi, M.: A k-anonymous rule clustering approach for data publishing. J. Adv. Comput. Intell. Intell. Inform. 21(6), 980–988 (2017)
Inuiguchi, M.: Rough set analysis of imprecise classes. In: Wang, G., Skowron, A., Yao, Y., Ślȩzak, D., Polkowski, L. (eds.) Thriving Rough Sets: Studies in Computational Intelligence, vol. 708, pp. 157–185. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-54966-8_8
Grzymala-Busse, J.W.: MLEM2 - discretization during rule induction. In: Klopotek, M.A., Wierzchon, S.T., Trojanowski, K. (eds.) Intelligent Information Processing and Web Mining, vol. 22. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-36562-4_53
Hamakawa, T, Inuiguchi, M.: On the utility of imprecise rules induced by MLEM2 in classification. In: Proceedings of 2014 IEEE International Conference on Granular Computing, pp. 76–81. IEEE Xplore (2014)
UCI Machine Learning Repository. http://archive.ics.uci.edu/ml/
Acknowledgment
This work was partially supported by JSPS KAKENHI Grant Number 18H01658.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Inuiguchi, M., Washimi, K. (2019). Utilization of Imprecise Rules for Privacy Protection. In: Seki, H., Nguyen, C., Huynh, VN., Inuiguchi, M. (eds) Integrated Uncertainty in Knowledge Modelling and Decision Making. IUKM 2019. Lecture Notes in Computer Science(), vol 11471. Springer, Cham. https://doi.org/10.1007/978-3-030-14815-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-14815-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14814-0
Online ISBN: 978-3-030-14815-7
eBook Packages: Computer ScienceComputer Science (R0)