A new framework of privacy preserving data sharing

We introduce a dataset reconstruction based framework for data sharing with privacy preserving. The proposed framework uses a constraint-based inverse itemset lattice mining technique to automatically generate a sample dataset to be released for sharing. In this framework, data owners can control the potential mine-able knowledge (frequent itemsets in our context) from the released dataset. Before generating the sample dataset, the potential mine-able knowledge set is checked for two aspects: One is for the compliancy of user-specified security constraint and the trade-off principle, so that the sensitive patterns are well protected while the side-effect is tolerable. The other check is verification for consistency among itemset supports in the lattice so that it is sensible for inverse dataset reconstruction. This mechanism offers the data owner total control of the potentially discoverable knowledge from publicly accessible datasets, and at the same time the released data matches with the main features of the original dataset for sharable knowledge, thus the user’s privacy can be preserved.

[1]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[2]  Taneli Mielikäinen,et al.  On Inverse Frequent Set Mining , 2003 .

[3]  Stanley Robson de Medeiros Oliveira,et al.  Privacy preserving frequent itemset mining , 2002 .

[4]  Osmar R. Zaïane,et al.  Algorithms for balancing privacy and knowledge discovery in association rule mining , 2003, Seventh International Database Engineering and Applications Symposium, 2003. Proceedings..

[5]  Toon Calders Computational complexity of itemset frequency satisfiability , 2004, PODS '04.

[6]  Irit Dinur,et al.  Revealing information while preserving privacy , 2003, PODS.

[7]  Osmar R. Zaïane,et al.  Protecting sensitive knowledge by data sanitization , 2003, Third IEEE International Conference on Data Mining.

[8]  Elisa Bertino,et al.  Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.

[9]  Xiaohua Hu,et al.  Using attribute value lattice to find closed frequent itemsets , 2003, SPIE Defense + Commercial Sensing.

[10]  Yücel Saygin,et al.  Secure Association Rule Sharing , 2004, PAKDD.

[11]  Rakesh Agarwal,et al.  Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.

[12]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.

[13]  Qi Wang,et al.  On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[14]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.