Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
關聯式規則探勘隱私保護之隱私性與可用性之評估 = Evaluating ...
~
國立高雄大學資訊管理學系碩士班
關聯式規則探勘隱私保護之隱私性與可用性之評估 = Evaluating Privacy and Utility in Privacy-Preserving Association Rule Mining
Record Type:
Language materials, printed : monographic
Paralel Title:
Evaluating Privacy and Utility in Privacy-Preserving Association Rule Mining
Author:
宋承祐,
Secondary Intellectual Responsibility:
國立高雄大學
Place of Publication:
高雄市
Published:
撰者;
Year of Publication:
2016[民105]
Description:
39面圖,表格 : 30公分;
Subject:
關聯式規則探勘
Subject:
Privacy-Preserving
Online resource:
http://handle.ncl.edu.tw/11296/ndltd/56930810974555846118
Notes:
106年4月25日公開
Notes:
參考書目: 面33-35
Summary:
近幾年來,越多的資料被發布、被分析,而隱私保護也就越來越受重視。一些隱私的訊息,可以由資料連結、資料探勘等推論出來。k隱匿是第一個被提出來隱藏敏感資訊,不受資料的連結而洩漏隱私的概念,但卻沒有考慮到資料探勘後敏感的結果。關聯式規則隱藏的技術則是後來為了隱藏資料探勘的敏感結果而被提出。然而這些直接性的隱藏技術會有副作用,像是需要隱藏的規則卻沒被完全隱藏到、衍生了一些新規則等等。我們探討並比較先做k隱匿再做關聯式規則探勘,以及直接做關聯式規則隱藏的兩種資料保護方法的優缺點。本研究提出一個新的方法架構,來評估資料探勘後的隱私性的提升以及資料可用性的流失。比較這兩種方法的數值說明了k隱匿有著較高的隱私性的提升,而關聯式規則隱藏保留著較多的資料可用性的流失。 In recent years, privacy preservation has attracted much interest due to concerns regarding breaches of privacy when data are published and analyzed. Private information can be observed directly from published data or inferred through data mining techniques. The k-anonymity concept was first proposed to hide sensitive attribute values that could be discovered using a linking attack. Association rule hiding techniques have been proposed to hide sensitive patterns in mining results. However, these association rule hiding techniques have side effects such as hiding failure, creation of new rules, and lost rules. In addition, the k-anonymity approach does not consider hiding association rules. In this work, we extend the k-anonymity concept to hide sensitive association rules and compare it with the association rule hiding approach. We propose a novel concept of measuring privacy gain and utility loss of anonymized association rules. Numerical experiments comparing the two approaches show that the k-anonymity for association rule mining approach achieves higher privacy gain, while the direct anonymization approach of association rule hiding achieves lower utility loss. The results obtained here provide a guideline for adopting anonymization techniques under different requirements and suggests a direction for the development of new association rule hiding techniques.
關聯式規則探勘隱私保護之隱私性與可用性之評估 = Evaluating Privacy and Utility in Privacy-Preserving Association Rule Mining
宋, 承祐
關聯式規則探勘隱私保護之隱私性與可用性之評估
= Evaluating Privacy and Utility in Privacy-Preserving Association Rule Mining / 宋承祐撰 - 高雄市 : 撰者, 2016[民105]. - 39面 ; 圖,表格 ; 30公分.
106年4月25日公開參考書目: 面33-35.
關聯式規則探勘Privacy-Preserving
關聯式規則探勘隱私保護之隱私性與可用性之評估 = Evaluating Privacy and Utility in Privacy-Preserving Association Rule Mining
LDR
:03471pam0a2200277 450
001
496644
005
20170505090216.0
010
0
$b
平裝
010
0
$b
精裝
100
$a
20170406d2016 k y0chiy50 e
101
1
$a
chi
$d
chi
$d
eng
102
$a
tw
105
$a
ak am 000yy
200
1
$a
關聯式規則探勘隱私保護之隱私性與可用性之評估
$d
Evaluating Privacy and Utility in Privacy-Preserving Association Rule Mining
$z
eng
$f
宋承祐撰
210
$a
高雄市
$c
撰者
$d
2016[民105]
215
0
$a
39面
$c
圖,表格
$d
30公分
300
$a
106年4月25日公開
300
$a
參考書目: 面33-35
314
$a
指導教授: 王學亮博士
328
$a
碩士論文--國立高雄大學資訊管理學系碩士班
330
$a
近幾年來,越多的資料被發布、被分析,而隱私保護也就越來越受重視。一些隱私的訊息,可以由資料連結、資料探勘等推論出來。k隱匿是第一個被提出來隱藏敏感資訊,不受資料的連結而洩漏隱私的概念,但卻沒有考慮到資料探勘後敏感的結果。關聯式規則隱藏的技術則是後來為了隱藏資料探勘的敏感結果而被提出。然而這些直接性的隱藏技術會有副作用,像是需要隱藏的規則卻沒被完全隱藏到、衍生了一些新規則等等。我們探討並比較先做k隱匿再做關聯式規則探勘,以及直接做關聯式規則隱藏的兩種資料保護方法的優缺點。本研究提出一個新的方法架構,來評估資料探勘後的隱私性的提升以及資料可用性的流失。比較這兩種方法的數值說明了k隱匿有著較高的隱私性的提升,而關聯式規則隱藏保留著較多的資料可用性的流失。 In recent years, privacy preservation has attracted much interest due to concerns regarding breaches of privacy when data are published and analyzed. Private information can be observed directly from published data or inferred through data mining techniques. The k-anonymity concept was first proposed to hide sensitive attribute values that could be discovered using a linking attack. Association rule hiding techniques have been proposed to hide sensitive patterns in mining results. However, these association rule hiding techniques have side effects such as hiding failure, creation of new rules, and lost rules. In addition, the k-anonymity approach does not consider hiding association rules. In this work, we extend the k-anonymity concept to hide sensitive association rules and compare it with the association rule hiding approach. We propose a novel concept of measuring privacy gain and utility loss of anonymized association rules. Numerical experiments comparing the two approaches show that the k-anonymity for association rule mining approach achieves higher privacy gain, while the direct anonymization approach of association rule hiding achieves lower utility loss. The results obtained here provide a guideline for adopting anonymization techniques under different requirements and suggests a direction for the development of new association rule hiding techniques.
510
1
$a
Evaluating Privacy and Utility in Privacy-Preserving Association Rule Mining
$z
eng
610
0
$a
關聯式規則探勘
$a
隱私保護
610
1
$a
Privacy-Preserving
$a
Association Rule Mining
681
$a
008M/0019
$b
464105 3013
$v
2007年版
700
1
$a
宋
$b
承祐
$4
撰
$3
759243
712
0 2
$a
國立高雄大學
$b
資訊管理學系碩士班
$3
353936
801
0
$a
tw
$b
NUK
$c
20170406
$g
CCR
856
7 #
$u
http://handle.ncl.edu.tw/11296/ndltd/56930810974555846118
$z
電子資源
$2
http
based on 0 review(s)
ALL
博碩士論文區(二樓)
Items
2 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
310002720434
博碩士論文區(二樓)
不外借資料
學位論文
TH 008M/0019 464105 3013 2016
一般使用(Normal)
On shelf
0
310002720442
博碩士論文區(二樓)
不外借資料
學位論文
TH 008M/0019 464105 3013 2016 c.2
一般使用(Normal)
On shelf
0
2 records • Pages 1 •
1
Multimedia
Multimedia file
http://handle.ncl.edu.tw/11296/ndltd/56930810974555846118
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login