The problem of privacy-preserving data mining has been studied extensively in recent years because of the increased amount of personal information which is available to corporations and individuals. Most privacy transformations use some form of data perturbation or representational ambiguity in order to reduce the risk of identification. The final results from privacy transformation methods often require the underlying applications to be modified in order to work with the new representation of the data. Since the end results of privacy-transformation methods have not been standardized, the required modifications may vary with the method used for the privacy transformation. In some cases, it can be an enormous effort to re-design applications to work with the anonymized data. While the results of privacy-transformation methods are a natural form of uncertain data, the two problems have generally been studied independently. In this paper, we make a first attempt to unify the two fields, and propose a privacy transformation for which existing uncertain data management tools can be directly used. This is a great advantage, since it means that the wide spectrum of research available for uncertain data management can also be used for privacy-preserving data mining. We propose an uncertain version of the k-anonymity model which is related to the well known deterministic model of k- anonymity. The uncertain version of the k-anonymity model has the additional feature of introducing greater uncertainty for the adversary over an equivalent deterministic model. As specific instantiations of this approach, we test the effectiveness of the privacy transformation on the problems of query estimation and classification, and show that the technique retains greater accuracy than other k-anonymity models.
[1]
T. S. Jayram,et al.
OLAP over uncertain and imprecise data
,
2007,
The VLDB Journal.
[2]
Jayant R. Haritsa,et al.
Maintaining Data Privacy in Association Rule Mining
,
2002,
VLDB.
[3]
Ashwin Machanavajjhala,et al.
l-Diversity: Privacy Beyond k-Anonymity
,
2006,
ICDE.
[4]
Pierangela Samarati,et al.
Protecting Respondents' Identities in Microdata Release
,
2001,
IEEE Trans. Knowl. Data Eng..
[5]
Laks V. S. Lakshmanan,et al.
ProbView: a flexible probabilistic database system
,
1997,
TODS.
[6]
Philip S. Yu,et al.
A Condensation Approach to Privacy Preserving Data Mining
,
2004,
EDBT.
[7]
Sally I. McClean,et al.
Aggregation of Imprecise and Uncertain Information in Databases
,
2001,
IEEE Trans. Knowl. Data Eng..
[8]
Ramakrishnan Srikant,et al.
Privacy-preserving data mining
,
2000,
SIGMOD '00.
[9]
ASHWIN MACHANAVAJJHALA,et al.
L-diversity: privacy beyond k-anonymity
,
2006,
22nd International Conference on Data Engineering (ICDE'06).
[10]
Hans-Peter Kriegel,et al.
Density-based clustering of uncertain data
,
2005,
KDD '05.
[11]
Henryk Wozniakowski,et al.
The statistical security of a statistical database
,
1984,
TODS.
[12]
Yufei Tao,et al.
Personalized privacy preservation
,
2006,
Privacy-Preserving Data Mining.
[13]
Charu C. Aggarwal,et al.
On the design and quantification of privacy preserving data mining algorithms
,
2001,
PODS.