Skip to main content

Correlation Based Anonymization Using Generalization and Suppression for Disclosure Problems

  • Conference paper
Advances in Intelligent Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 320))

Abstract

Huge volume of detailed personal data is regularly collected and sharing of these data is proved to be beneficial for data mining application. Data that include shopping habits, criminal records, credit records and medical history are very necessary for an organization to perform analysis and predict the trends and patterns, but it may prevent the data owners from sharing the data because of many privacy regulations. In order to share data while preserving privacy, data owner must come up with a solution which achieves the dual goal of privacy preservation as well as accurate data mining result. In this paper k-Anonymity based approach is used to provide privacy to individual data by masking the attribute values using generalization and suppression. Due to some drawbacks of the existing model, it needs to be modified to fulfill the goal. Proposed model tries to prevent data disclosure problem by using correlation coefficient which estimates amount of correlation between attributes and helps to automate the attribute selection process for generalization and suppression. The main aim of proposed model is to increase the Privacy Gain and to maintain the accuracy of the data after anonymization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: K-Anonymous Data Mining: A Survey. In: Advances in Database Systems. Springer, US (2008)

    Google Scholar 

  2. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proc. 22nd Intnl. Conf. Data Engg. (ICDE), p. 24 (2006)

    Google Scholar 

  3. Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory (1998)

    Google Scholar 

  4. Sweeney, L.: K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzz. 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  5. LeFevre, K., De Witt, D.J., Ramakrishnan, R.: Multidimensional K-Anonymity

    Google Scholar 

  6. Samarati, P.: Protecting Respondents’ Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering 13(6) (2001)

    Google Scholar 

  7. Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and l-diversity. In: ICDE, pp. 106–115 (2007)

    Google Scholar 

  8. Wu, Y., Ruan, X., Liao, S., Wang, X.: P-Cover K-anonymity model for Protecting Multiple Sensitive Attributes. IEEE (2010)

    Google Scholar 

  9. Gionis, A., Tassa, T.: k-Anonymization with Minimal Loss of Information. IEEE Transactions on Knowledge and Data Engineering 21(2) (2009)

    Google Scholar 

  10. Aggarwal, C.C., Yu, P.S.: Privacy-Preserving Data Mining: Models And Algorithms. Kluwer Academic Publishers

    Google Scholar 

  11. Gionis, A., Tassa, T.: k-Anonymization with Minimal Loss of Information. IEEE Transactions on Knowledge and Data Engineering 21 (2009)

    Google Scholar 

  12. Kedar, S., Dhawale, S., Vaibhav, W., Kadam, P., Wani, S., Ingale, P.: Privacy Preserving Data Mining. International Journal of Advanced Research in Computer and Communication Engineering 2(4) (2013)

    Google Scholar 

  13. Malik, M.B., Ghazi, M.A., Ali, R.: Privacy Preserving Data Mining Techniques: Current Scenario and Future. In: 2012 IEEE Third International Conference on Computer and Communication Technology (2012)

    Google Scholar 

  14. Mahesh, R., Meyyappan, T.: Anonymization Technique through Record Elimination to Preserve Privacy of Published Data. In: Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (2013)

    Google Scholar 

  15. Maheshwarkar, N., Pathak, K., Chourey, V.: N-SA K-anonymity Model: A Model Exclusive of Tuple Suppression Technique. In: Third Global Congress on Intelligent Systems (2012)

    Google Scholar 

  16. Liu, J., Luo, J., Huang, J.Z.: Rating: Privacy Preservation for Multiple Attributes with Different Sensitivity Requirements. In: 11th IEEE International Conference on Data Mining Workshops (2011)

    Google Scholar 

  17. Wang, Q., Xu, Z., Qu, S.: An Enhanced K-Anonymity Model against Homogeneity Attack. Journal of Software 6(10) (2011)

    Google Scholar 

  18. Mogre, N.V., Agarwal, G., Patil, P.: A Review on Data Anonymization Technique For Data Publishing. International Journal of Engineering Research & Technology (IJERT) 1(10) (2012) ISSN: 2278-0181

    Google Scholar 

  19. Kisilevich, S., Rokach, L., Elovici, Y.: Member, IEEE, and Brach Shapira, Efficient Multidimensional Suppression for K-Anonymity. IEEE Transactions on Knowledge and Data Engineering 22(3) (2010)

    Google Scholar 

  20. Shanthi, A.S., Karthikeyan, M.: A Review on Privacy Preserving Data Mining (2012)

    Google Scholar 

  21. Ercan Nergiz, M., Clifton, C.: Thoughts on k-anonymization. Data & Knowledge Engineering 63, 622–645 (2007)

    Article  Google Scholar 

  22. Aggarwal, C.C.: On k-Anonymity and the Curse of Dimensionality. In: Proceedings of the 31st VLDB Conference, Trondheim, Norway (2005); International Journal of Information Security and Privacy 2(3), 28–44 (July-September 2008)

    Google Scholar 

  23. Gal, T.S., Chen, Z., Gangopadhyay, A.: A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes. International Journal of Information Security and Privacy 2(3), 28–44 (2008)

    Article  Google Scholar 

  24. Nargundi, S.M., Phalnikar, R.: k-Anonymization using Multidimen-sional Suppression for Data De-identificatio. International Journal of Computer Application 60(11), 975–8887 (2012)

    Google Scholar 

  25. Wong, R.C.-W., Fu, A.W.-C., Wang, K., Pei, J.: Ano-nymization-Based Attacks in Privacy-Preserving Data Publishing. ACM Trans-actions on Database Systems 34(2) Article 8 (Publication date: June 2009)

    Google Scholar 

  26. Woodward, B.: The computer-based patient record confidentiality. The New England Journal of Medicine 333(21), 1419–1422 (1995)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Thakkar, A., Bhatti, A.A., Vasa, J. (2015). Correlation Based Anonymization Using Generalization and Suppression for Disclosure Problems. In: El-Alfy, ES., Thampi, S., Takagi, H., Piramuthu, S., Hanne, T. (eds) Advances in Intelligent Informatics. Advances in Intelligent Systems and Computing, vol 320. Springer, Cham. https://doi.org/10.1007/978-3-319-11218-3_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11218-3_52

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11217-6

  • Online ISBN: 978-3-319-11218-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics