Abstract
The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gkoulalas-Divanis, A., Verykios, V.S.: An Overview of Privacy Preserving Data Mining. Crossroads archive 15(4), Article No. 6 (June 2009)
Liu, Y., Lv, D., Wang, C., Feng, J., Deng, Q., Ye, Y.: BSGI An Effective Algorithm towards Stronger l-Diversity. In: Yu Liu, D.L. (ed.) Applications table of contents Turin, Italy, pp. 19–32 (2008) (Data Privacy table of contents)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-Diversity: Privacy Beyond k-Anonymity. ACM Transactions on Knowledge Discovery from Data 1(1), Article 3, 1:52 (2007)
UCI, Irvin Machine Learning Repository
Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.-C.: Utility-Based Anonymization Using Local Recoding (2006)
Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings on 21st International Conference (2005)
Webb, G.I.: Opus:An Effcient Admissible Algorithm for Unordered Search (1995)
Rymon, R.: Search Through Systematic Set Enumeration (1992)
Iyengar, V.S.: Transforming Data to Satisfy Privacy Constrains (2002)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression (2002)
Whitley, D.: The Genitor Algorithm and Selective Pressure: Why rank-based allocation of reproductive trials is best. In: Proceedings of Third International Conference on Genetic Algorithms, pp. 116–121 (1989)
Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: VLDB, pp. 139–150 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tsiafoulis, S., Zorkadis, V.C., Karras, D.A. (2010). A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining. In: Kim, Th., Yau, S.S., Gervasi, O., Kang, BH., Stoica, A., Ślęzak, D. (eds) Grid and Distributed Computing, Control and Automation. GDC CA 2010 2010. Communications in Computer and Information Science, vol 121. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17625-8_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-17625-8_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17624-1
Online ISBN: 978-3-642-17625-8
eBook Packages: Computer ScienceComputer Science (R0)