Abstract
Huge volume of detailed personal data is regularly collected and sharing of these data is proved to be beneficial for data mining application. Data that include shopping habits, criminal records, credit records and medical history are very necessary for an organization to perform analysis and predict the trends and patterns, but it may prevent the data owners from sharing the data because of many privacy regulations. In order to share data while preserving privacy, data owner must come up with a solution which achieves the dual goal of privacy preservation as well as accurate data mining result. In this paper k-Anonymity based approach is used to provide privacy to individual data by masking the attribute values using generalization and suppression. Due to some drawbacks of the existing model, it needs to be modified to fulfill the goal. Proposed model tries to prevent data disclosure problem by using correlation coefficient which estimates amount of correlation between attributes and helps to automate the attribute selection process for generalization and suppression. The main aim of proposed model is to increase the Privacy Gain and to maintain the accuracy of the data after anonymization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: K-Anonymous Data Mining: A Survey. In: Advances in Database Systems. Springer, US (2008)
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proc. 22nd Intnl. Conf. Data Engg. (ICDE), p. 24 (2006)
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory (1998)
Sweeney, L.: K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzz. 10(5), 557–570 (2002)
LeFevre, K., De Witt, D.J., Ramakrishnan, R.: Multidimensional K-Anonymity
Samarati, P.: Protecting Respondents’ Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering 13(6) (2001)
Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and l-diversity. In: ICDE, pp. 106–115 (2007)
Wu, Y., Ruan, X., Liao, S., Wang, X.: P-Cover K-anonymity model for Protecting Multiple Sensitive Attributes. IEEE (2010)
Gionis, A., Tassa, T.: k-Anonymization with Minimal Loss of Information. IEEE Transactions on Knowledge and Data Engineering 21(2) (2009)
Aggarwal, C.C., Yu, P.S.: Privacy-Preserving Data Mining: Models And Algorithms. Kluwer Academic Publishers
Gionis, A., Tassa, T.: k-Anonymization with Minimal Loss of Information. IEEE Transactions on Knowledge and Data Engineering 21 (2009)
Kedar, S., Dhawale, S., Vaibhav, W., Kadam, P., Wani, S., Ingale, P.: Privacy Preserving Data Mining. International Journal of Advanced Research in Computer and Communication Engineering 2(4) (2013)
Malik, M.B., Ghazi, M.A., Ali, R.: Privacy Preserving Data Mining Techniques: Current Scenario and Future. In: 2012 IEEE Third International Conference on Computer and Communication Technology (2012)
Mahesh, R., Meyyappan, T.: Anonymization Technique through Record Elimination to Preserve Privacy of Published Data. In: Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (2013)
Maheshwarkar, N., Pathak, K., Chourey, V.: N-SA K-anonymity Model: A Model Exclusive of Tuple Suppression Technique. In: Third Global Congress on Intelligent Systems (2012)
Liu, J., Luo, J., Huang, J.Z.: Rating: Privacy Preservation for Multiple Attributes with Different Sensitivity Requirements. In: 11th IEEE International Conference on Data Mining Workshops (2011)
Wang, Q., Xu, Z., Qu, S.: An Enhanced K-Anonymity Model against Homogeneity Attack. Journal of Software 6(10) (2011)
Mogre, N.V., Agarwal, G., Patil, P.: A Review on Data Anonymization Technique For Data Publishing. International Journal of Engineering Research & Technology (IJERT)Â 1(10) (2012) ISSN: 2278-0181
Kisilevich, S., Rokach, L., Elovici, Y.: Member, IEEE, and Brach Shapira, Efficient Multidimensional Suppression for K-Anonymity. IEEE Transactions on Knowledge and Data Engineering 22(3) (2010)
Shanthi, A.S., Karthikeyan, M.: A Review on Privacy Preserving Data Mining (2012)
Ercan Nergiz, M., Clifton, C.: Thoughts on k-anonymization. Data & Knowledge Engineering 63, 622–645 (2007)
Aggarwal, C.C.: On k-Anonymity and the Curse of Dimensionality. In: Proceedings of the 31st VLDB Conference, Trondheim, Norway (2005); International Journal of Information Security and Privacy 2(3), 28–44 (July-September 2008)
Gal, T.S., Chen, Z., Gangopadhyay, A.: A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes. International Journal of Information Security and Privacy 2(3), 28–44 (2008)
Nargundi, S.M., Phalnikar, R.: k-Anonymization using Multidimen-sional Suppression for Data De-identificatio. International Journal of Computer Application 60(11), 975–8887 (2012)
Wong, R.C.-W., Fu, A.W.-C., Wang, K., Pei, J.: Ano-nymization-Based Attacks in Privacy-Preserving Data Publishing. ACM Trans-actions on Database Systems 34(2) Article 8 (Publication date: June 2009)
Woodward, B.: The computer-based patient record confidentiality. The New England Journal of Medicine 333(21), 1419–1422 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Thakkar, A., Bhatti, A.A., Vasa, J. (2015). Correlation Based Anonymization Using Generalization and Suppression for Disclosure Problems. In: El-Alfy, ES., Thampi, S., Takagi, H., Piramuthu, S., Hanne, T. (eds) Advances in Intelligent Informatics. Advances in Intelligent Systems and Computing, vol 320. Springer, Cham. https://doi.org/10.1007/978-3-319-11218-3_52
Download citation
DOI: https://doi.org/10.1007/978-3-319-11218-3_52
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11217-6
Online ISBN: 978-3-319-11218-3
eBook Packages: EngineeringEngineering (R0)