k-Anonymized Reducts. Rokach, L. & Schclar, A. In 2010 IEEE International Conference on Granular Computing, GrC 2010, San Jose, California, USA, 14-16 August 2010, pages 392 -395, 2010. Link Paper doi abstract bibtex Privacy preserving data mining aims to prevent the violation of privacy that might result from mining of sensitive data. This is commonly achieved by data anonymization. One way to anonymize data is adherence to the k-anonymity concept which requires that the probability to identify an individual by linking databases not to exceed 1/k. In this paper we propose an algorithm which utilizes rough set theory to achieve k-anonymity. The basic idea is to partition the original dataset into several disjoint reducts such that each one of them adheres to k-anonymity. We show that it is easier to make each reduct comply with k-anonymity if it does not contain all quasi-identifier attributes. Moreover, our procedure ensures that even if the attacker attempts to rejoin the reducts, the k-anonymity is still preserved.
@inproceedings{DBLP:conf/grc/RokachS10,
author = {Lior Rokach and
Alon Schclar},
title = {k-Anonymized Reducts},
ee = {http://dx.doi.org/10.1109/GrC.2010.162},
url = {http://www.ise.bgu.ac.il/faculty/liorr/XROKACH.pdf},
bibsource = {DBLP, http://dblp.uni-trier.de},
pages = {392-395},
booktitle = {2010 IEEE International Conference on Granular Computing,
GrC 2010, San Jose, California, USA, 14-16 August 2010},
year = {2010},
pages={392 -395},
abstract={Privacy preserving data mining aims to prevent the violation of privacy that might result from mining of sensitive data. This is commonly achieved by data anonymization. One way to anonymize data is adherence to the k-anonymity concept which requires that the probability to identify an individual by linking databases not to exceed 1/k. In this paper we propose an algorithm which utilizes rough set theory to achieve k-anonymity. The basic idea is to partition the original dataset into several disjoint reducts such that each one of them adheres to k-anonymity. We show that it is easier to make each reduct comply with k-anonymity if it does not contain all quasi-identifier attributes. Moreover, our procedure ensures that even if the attacker attempts to rejoin the reducts, the k-anonymity is still preserved.},
doi={10.1109/GrC.2010.162},
keywords = {Privacy, Anonymization, Information security}
}
Downloads: 0
{"_id":{"_str":"5342b7670e946d920a0033cb"},"__v":19,"authorIDs":["5463d9f24f4818cf4f00041a","5de9bbce5b51bcde01000139","T7nhCxakPutsxwxZG"],"author_short":["Rokach, L.","Schclar, A."],"bibbaseid":"rokach-schclar-kanonymizedreducts-2010","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Lior"],"propositions":[],"lastnames":["Rokach"],"suffixes":[]},{"firstnames":["Alon"],"propositions":[],"lastnames":["Schclar"],"suffixes":[]}],"title":"k-Anonymized Reducts","ee":"http://dx.doi.org/10.1109/GrC.2010.162","url":"http://www.ise.bgu.ac.il/faculty/liorr/XROKACH.pdf","bibsource":"DBLP, http://dblp.uni-trier.de","pages":"392 -395","booktitle":"2010 IEEE International Conference on Granular Computing, GrC 2010, San Jose, California, USA, 14-16 August 2010","year":"2010","abstract":"Privacy preserving data mining aims to prevent the violation of privacy that might result from mining of sensitive data. This is commonly achieved by data anonymization. One way to anonymize data is adherence to the k-anonymity concept which requires that the probability to identify an individual by linking databases not to exceed 1/k. In this paper we propose an algorithm which utilizes rough set theory to achieve k-anonymity. The basic idea is to partition the original dataset into several disjoint reducts such that each one of them adheres to k-anonymity. We show that it is easier to make each reduct comply with k-anonymity if it does not contain all quasi-identifier attributes. Moreover, our procedure ensures that even if the attacker attempts to rejoin the reducts, the k-anonymity is still preserved.","doi":"10.1109/GrC.2010.162","keywords":"Privacy, Anonymization, Information security","bibtex":"@inproceedings{DBLP:conf/grc/RokachS10,\r\n author = {Lior Rokach and\r\n Alon Schclar},\r\n title = {k-Anonymized Reducts},\r\n ee = {http://dx.doi.org/10.1109/GrC.2010.162},\r\n url\t\t= {http://www.ise.bgu.ac.il/faculty/liorr/XROKACH.pdf},\r\n bibsource = {DBLP, http://dblp.uni-trier.de},\r\n pages = {392-395},\r\n booktitle = {2010 IEEE International Conference on Granular Computing,\r\n GrC 2010, San Jose, California, USA, 14-16 August 2010},\r\n year = {2010},\r\n pages={392 -395},\r\n abstract={Privacy preserving data mining aims to prevent the violation of privacy that might result from mining of sensitive data. This is commonly achieved by data anonymization. One way to anonymize data is adherence to the k-anonymity concept which requires that the probability to identify an individual by linking databases not to exceed 1/k. In this paper we propose an algorithm which utilizes rough set theory to achieve k-anonymity. The basic idea is to partition the original dataset into several disjoint reducts such that each one of them adheres to k-anonymity. We show that it is easier to make each reduct comply with k-anonymity if it does not contain all quasi-identifier attributes. Moreover, our procedure ensures that even if the attacker attempts to rejoin the reducts, the k-anonymity is still preserved.},\r\n doi={10.1109/GrC.2010.162}, \r\n keywords = {Privacy, Anonymization, Information security}\r\n}\r\n\r\n","author_short":["Rokach, L.","Schclar, A."],"key":"DBLP:conf/grc/RokachS10","id":"DBLP:conf/grc/RokachS10","bibbaseid":"rokach-schclar-kanonymizedreducts-2010","role":"author","urls":{"Link":"http://dx.doi.org/10.1109/GrC.2010.162","Paper":"http://www.ise.bgu.ac.il/faculty/liorr/XROKACH.pdf"},"keyword":["Privacy","Anonymization","Information security"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"www.ise.bgu.ac.il/faculty/liorr/liorrokach122012.txt","downloads":0,"keywords":["privacy","anonymization","information security"],"search_terms":["anonymized","reducts","rokach","schclar"],"title":"k-Anonymized Reducts","year":2010,"dataSources":["HLsp6sSsQQZwywcSL","NhJvHJs9CpZ5T5D7K"]}