Imprecise Rules for Data Privacy
When rules are induced, some rules can be supported only by a very small number of objects. Such rules often correspond to special cases so that supporting objects may be easily estimated. If the rules with small support include some sensitive data, this estimation of objects is not very good in the sense of data privacy. Considering this fact, we investigate utilization of imprecise rules for privacy protection in rule induction. Imprecise rules are rules classifying objects only into a set of possible classes. Utilizing imprecise rules, we propose an algorithm to induce k-anonymous rules, rules with k or more supporting objects. We demonstrate that the accuracy of the classifier with rules induced by the proposed algorithm is not worse than that of the classifier with rules induced by the conventional method. Moreover, the advantage of the proposed method with imprecise rules is examined by comparing other conceivable method with precise rules.
KeywordsRule induction Imprecise rules MLEM2 Privacy protection k-anonymity
This work was partially supported by JSPS KAKENHI Grant Number 26350423.
- 1.Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Morgan Kaufmann, Burlington (2011)Google Scholar
- 4.Hamakawa, T, Inuiguchi, M.: On the Utility of Imprecise Rules Induced by MLEM2 in Classification. In: Proceedings of 2014 IEEE International Conference on Granular Computing C, pp. 76–81. IEEE Xplore (2014)Google Scholar
- 5.Domingo-Ferrer, J., Torra, V.: Disclosure control methods and information loss for microdata, confidentiality, disclosure, and data access. In: Doyle, P., et al. (eds.) Theory and Practical Applications for Statistical Agencies, pp. 91–110. Elsevier, Amsterdam (2001)Google Scholar
- 10.Yakoubov, S., Gadepally, V., Schear, N., Shen, E., Yerukhimovich, A.: A survey of cryptographic approaches to securing big-data analytics in the cloud. In: Proceedings of 2014 IEEE High Performance Extreme Computing Conference, pp. 1–6. IEEE Xplore (2014)Google Scholar
- 11.Zhou, Z., Huang, L., Yun, Y.: Privacy preserving attribute reduction based on rough set. In: Proceedings of 2nd International Workshop on Knowledge Discovery and Data Mining. WKKD 2009, pp. 202–206. AAAI, Portland (2009)Google Scholar
- 12.Rokach, L., Schclar, A.: k-anonymized reducts. In: Proceedings of 2010 IEEE International Conference on Granular Computing, pp. 392–395. IEEE Xplore (2010)Google Scholar
- 15.UCI Machine Learning Repository. http://archive.ics.uci.edu/ml/
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.