k-anonymized reducts

Lior Rokach, Alon Schclar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Privacy preserving data mining aims to prevent the violation of privacy that might result from mining of sensitive data. This is commonly achieved by data anonymization. One way to anonymize data is adherence to the k-anonymity concept which requires that the probability to identify an individual by linking databases not to exceed 1/k. In this paper we propose an algorithm which utilizes rough set theory to achieve k-anonymity. The basic idea is to partition the original dataset into several disjoint reducts such that each one of them adheres to k-anonymity. We show that it is easier to make each reduct comply with k-anonymity if it does not contain all quasi-identifier attributes. Moreover, our procedure ensures that even if the attacker attempts to rejoin the reducts, the kanonymity is still preserved.

Original languageEnglish
Title of host publicationProceedings - 2010 IEEE International Conference on Granular Computing, GrC 2010
Pages392-395
Number of pages4
DOIs
StatePublished - 1 Nov 2010
Event2010 IEEE International Conference on Granular Computing, GrC 2010 - San Jose, CA, United States
Duration: 14 Aug 201016 Aug 2010

Publication series

NameProceedings - 2010 IEEE International Conference on Granular Computing, GrC 2010

Conference

Conference2010 IEEE International Conference on Granular Computing, GrC 2010
Country/TerritoryUnited States
CitySan Jose, CA
Period14/08/1016/08/10

Keywords

  • Reducts
  • Rough set theory
  • k-anonimity

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'k-anonymized reducts'. Together they form a unique fingerprint.

Cite this