Skip to main content

Identifying the Risk of Attribute Disclosure by Mining Fuzzy Rules

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 80))

Abstract

In this paper we address the problem of controlling the disclosure of sensible information by inferring them by the other attributes made public. This threat to privacy is commonly known as prediction or attribute disclosure. Our approach is based on identifying those rules able to link sensitive information to the other attributes being released. In particular, the method presented in this paper is based on mining fuzzy rules. The fuzzy approach is compared to (crisp) decision trees in order to highlight pros and cons of it.

Authors acknowledge financial support by Grant MTM2008-01519 from Ministry of Science and Innovation and Grant TIN2007-61273 from Ministry of Education and Science, Government of Spain.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Domingo-Ferrer, J., Torra, V.: On the connections between statistical disclosure control for microdata and some artificial intelligence tools. Inf. Sci. Inf. Comput. Sci. 151, 153–170 (2003)

    MATH  Google Scholar 

  2. Joachims, T.: Making large-scale support vector machine learning practical. In: Smola, A., Scholkopf, B., Burges, C. (eds.) Advances in Kernel Methods: Support Vector Machines. MIT Press, Cambridge (1998)

    Google Scholar 

  3. Li, N., Li, T.: t-closeness: Privacy beyond k-anonymity and?-diversity. In: Proceedings of IEEE International Conference on Data Engineering (2007)

    Google Scholar 

  4. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: 22nd IEEE International Conference on Data Engineering (2006)

    Google Scholar 

  5. Pal, N.R., Chakraborty, S.: Fuzzy rule extraction from id3-type decision trees for real data. IEEE Transactions on Systems, Man, and Cybernetics, Part B 31(5), 745–754 (2001)

    Article  Google Scholar 

  6. Pham, D.T., Bigot, S., Dimov, S.S.: Rules-f: a fuzzy inductive learning algorithm. In: Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, pp. 1433–1444 (2006)

    Google Scholar 

  7. Quinlan, R.: c4.5: Programs of machine learning (1993)

    Google Scholar 

  8. Ranilla, J., Luaces, O., Bahamonde, A.: A heuristic for learning decision trees and pruning them into classification rules. AICom (Artificial Intelligence Communication) 16(2) (2003) (in press)

    Google Scholar 

  9. Ranilla, J., Antonio, B.: Fan: Finding accurate inductions. International Journal of Human Computer Studies 56(4), 445–474 (2002)

    Article  Google Scholar 

  10. Ranilla, J., Rodriguez-Muniz, L.J.: A heuristic approach to learning rules from fuzzy databases. IEEE Intelligent Systems 22(2), 62–68 (2007)

    Article  Google Scholar 

  11. Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13, 1010–1027 (2001)

    Article  Google Scholar 

  12. Sun, X., Wang, H., Li, J., Ross, D.: Achieving p-sensitive k-anonymity via anatomy. In: Proceedings of the 2009 IEEE International Conference on e-Business Engineering, Washington, DC, USA, pp. 199–205. IEEE Computer Society, Los Alamitos (2009)

    Chapter  Google Scholar 

  13. Willenborg, L., de Waal, T.: Statistical Disclosure Control in Practice. Springer, Heidelberg (1996)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Díaz, I., Ranilla, J., Rodríguez-Muniz, L.J., Troiano, L. (2010). Identifying the Risk of Attribute Disclosure by Mining Fuzzy Rules. In: Hüllermeier, E., Kruse, R., Hoffmann, F. (eds) Information Processing and Management of Uncertainty in Knowledge-Based Systems. Theory and Methods. IPMU 2010. Communications in Computer and Information Science, vol 80. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14055-6_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14055-6_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14054-9

  • Online ISBN: 978-3-642-14055-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics