關聯式規則探勘隱私保護之隱私性與可用性之評估 = Evaluating ...
國立高雄大學資訊管理學系碩士班

 

  • 關聯式規則探勘隱私保護之隱私性與可用性之評估 = Evaluating Privacy and Utility in Privacy-Preserving Association Rule Mining
  • Record Type: Language materials, printed : monographic
    Paralel Title: Evaluating Privacy and Utility in Privacy-Preserving Association Rule Mining
    Author: 宋承祐,
    Secondary Intellectual Responsibility: 國立高雄大學
    Place of Publication: 高雄市
    Published: 撰者;
    Year of Publication: 2016[民105]
    Description: 39面圖,表格 : 30公分;
    Subject: 關聯式規則探勘
    Subject: Privacy-Preserving
    Online resource: http://handle.ncl.edu.tw/11296/ndltd/56930810974555846118
    Notes: 106年4月25日公開
    Notes: 參考書目: 面33-35
    Summary: 近幾年來,越多的資料被發布、被分析,而隱私保護也就越來越受重視。一些隱私的訊息,可以由資料連結、資料探勘等推論出來。k隱匿是第一個被提出來隱藏敏感資訊,不受資料的連結而洩漏隱私的概念,但卻沒有考慮到資料探勘後敏感的結果。關聯式規則隱藏的技術則是後來為了隱藏資料探勘的敏感結果而被提出。然而這些直接性的隱藏技術會有副作用,像是需要隱藏的規則卻沒被完全隱藏到、衍生了一些新規則等等。我們探討並比較先做k隱匿再做關聯式規則探勘,以及直接做關聯式規則隱藏的兩種資料保護方法的優缺點。本研究提出一個新的方法架構,來評估資料探勘後的隱私性的提升以及資料可用性的流失。比較這兩種方法的數值說明了k隱匿有著較高的隱私性的提升,而關聯式規則隱藏保留著較多的資料可用性的流失。 In recent years, privacy preservation has attracted much interest due to concerns regarding breaches of privacy when data are published and analyzed. Private information can be observed directly from published data or inferred through data mining techniques. The k-anonymity concept was first proposed to hide sensitive attribute values that could be discovered using a linking attack. Association rule hiding techniques have been proposed to hide sensitive patterns in mining results. However, these association rule hiding techniques have side effects such as hiding failure, creation of new rules, and lost rules. In addition, the k-anonymity approach does not consider hiding association rules. In this work, we extend the k-anonymity concept to hide sensitive association rules and compare it with the association rule hiding approach. We propose a novel concept of measuring privacy gain and utility loss of anonymized association rules. Numerical experiments comparing the two approaches show that the k-anonymity for association rule mining approach achieves higher privacy gain, while the direct anonymization approach of association rule hiding achieves lower utility loss. The results obtained here provide a guideline for adopting anonymization techniques under different requirements and suggests a direction for the development of new association rule hiding techniques.
Items
  • 2 records • Pages 1 •
 
310002720434 博碩士論文區(二樓) 不外借資料 學位論文 TH 008M/0019 464105 3013 2016 一般使用(Normal) On shelf 0
310002720442 博碩士論文區(二樓) 不外借資料 學位論文 TH 008M/0019 464105 3013 2016 c.2 一般使用(Normal) On shelf 0
  • 2 records • Pages 1 •
Reviews
Export
pickup library
 
 
Change password
Login