Previous |  Up |  Next

Article

Title: On the comparison of some fuzzy clustering methods for privacy preserving data mining: Towards the development of specific information loss measures (English)
Author: Torra, Vicenç
Author: Endo, Yasunori
Author: Miyamoto, Sadaaki
Language: English
Journal: Kybernetika
ISSN: 0023-5954
Volume: 45
Issue: 3
Year: 2009
Pages: 548-560
Summary lang: English
.
Category: math
.
Summary: Policy makers and researchers require raw data collected from agencies and companies for their analysis. Nevertheless, any transmission of data to third parties should satisfy some privacy requirements in order to avoid the disclosure of sensitive information. The areas of privacy preserving data mining and statistical disclosure control develop mechanisms for ensuring data privacy. Masking methods are one of such mechanisms. With them, third parties can do computations with a limited risk of disclosure. Disclosure risk and information loss measures have been developed in order to evaluate in which extent data is protected and in which extent data is perturbated. Most of the information loss measures currently existing in the literature are general purpose ones (i. e., not oriented to a particular application). In this work we develop cluster specific information loss measures (for fuzzy clustering). For this purpose we study how to compare the results of fuzzy clustering. I. e., how to compare fuzzy clusters. (English)
Keyword: privacy preserving data mining
Keyword: statistical disclosure control
Keyword: fuzzy clustering
Keyword: fuzzy c-means
Keyword: fuzzy c-means with tolerance
MSC: 68T05
MSC: 68T37
MSC: 68T99
idZBL: Zbl 1183.68510
idMR: MR2543140
.
Date available: 2010-06-02T18:50:21Z
Last updated: 2012-06-06
Stable URL: http://hdl.handle.net/10338.dmlcz/140011
.
Reference: [1] J. C. Bezdek: Pattern Recognition with Fuzzy Objective Function Algorithms.Plenum Press, New York 1981. Zbl 0503.68069, MR 0631231
Reference: [2] : .CASC: Computational Aspects of Statistical Confidentiality, EU Project,
Reference: [3] : .http://neon.vb.cbs.nl/casc/ (Test Sets)
Reference: [4] J. Domingo-Ferrer and V. Torra: Disclosure control methods and information loss for microdata.In: Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies (P. Doyle, J. I. Lane, J. J. M. Theeuwes, and L. M. Zayatz, eds.), Elsevier 2001, pp. 91–110,
Reference: [5] J. Domingo-Ferrer and V. Torra: A quantitative comparison of disclosure control methods for microdata.In: Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies (P. Doyle, J. I. Lane, J. J. M. Theeuwes, and L. M. Zayatz, eds.), Elsevier 2001, pp. 111–133.
Reference: [6] G. Duncan, S. Fienberg, R. Krishnam, R. Padman, and S. Roehrig: Disclosure limitation methods and information loss for tabular data.In: Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies (P. Doyle, J. I. Lane, J. J. M. Theeuwes, and L. M. Zayatz, eds.), Elsevier 2001, pp. 135–166.
Reference: [7] G. Duncan, S. Keller-McNulty, and S. Stokes: Disclosure Risk vs.Data Utility: The R-U Confidentiality Map. Technical Report No. 121 of National Institute of Statistical Sciences 2001, www.niss.org.
Reference: [8] G. Duncan, S. Keller-McNulty, and S. Stokes: Database Security and Confidentiality: Examining Disclosure Risk vs.Data Utility Through the R-U Confidentiality Map. Technical Report No. 142 of National Institute of Statistical Sciences 2004, www.niss.org.
Reference: [9] Y. Hasegawa, Y. Endo, Y. Hamasuna, and S. Miyamoto: Fuzzy $c$-means for data with tolerance defined as hyper-rectangle.In: Proc. MDAI 2007 (Lecture Notes in Artificial Intelligence 4617), pp. 237–248.
Reference: [10] J. Lane, P. Heus, and T. Mulcahy: Data access in a cyber world: Making use of cyberinfrastructure.Trans. Data Privacy 1 (2008), 2–16. MR 2657177
Reference: [11] P. Medrano-Gracia, J. Pont-Tuset, J. Nin, and V. Muntés-Mulero: Ordered data set vectorization for linear regression on data privacy.In: Proc. MDAI 2007 (Lecture Notes in Artificial Intelligence 4617), Springer, Berlin 2007, pp. 361–372.
Reference: [12] S. Miyamoto and K. Umayahara: Methods in gard and fuzzy clustering.In: Soft Computing and Human-Centered Machines (Z.-Q. Liu and S. Miyamoto, eds.), Springer, Tokyo 2000, 85–129.
Reference: [13] S. Mukherjee, Z. Chen, and A. Gangopadhyay: A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms.The VLDB Journal 15 (2006), 293–315.
Reference: [14] R. Murata, Y. Endo, H. Haruyama, and S. Miyamoto: On fuzzy $c$-means for data with tolerance.J. Advanced Computational Intelligence and Intelligent Informatics 10 (2006), 5, 673–681.
Reference: [15] J. Nin, J. Herranz, and V. Torra: Rethinking rank swapping to decrease disclosure risk.Data and Knowledge Engrg. 64 (2008), 1, 346–364.
Reference: [16] A. Oganian and J. Domingo-Ferrer: On the complexity of optimal microaggregation for statistical disclosure control.Statistical J. United Nations Economic Commission for Europe 18 (2000), 4, 345–354.
Reference: [17] V. Torra and J. Domingo-Ferrer: Record linkage methods for multidatabase data mining.In: Information Fusion in Data Mining (V. Torra, ed.), Springer 2003, pp. 101–132.
Reference: [18] V. Torra and J. Nin: (2008) Record linkage for database integration using fuzzy integrals.Internat. J. Intel. Systems 23 (2008), 715–734.
Reference: [19] M. Trottini: Decision Models for Data Disclosure Limitation.Ph.D. Dissertation, Carnegie Mellon University 2003, http://www.niss.org/dgii/TR/Thesis-Trottini-final.pdf. MR 2620875
Reference: [20] W. E. Yancey, W. E. Winkler, and R. H. Creecy: Disclosure risk assessment in perturbative microdata protection.In: Inference Control in Statistical Databases 2002 (Lecture Notes in Computer Science 2316), Springer, Berlin 2003, pp. 135–152. MR 1967902
Reference: [21] A. C. Yao: Protocols for secure computations.In: Proc. 23rd IEEE Symposium on Foundations of Computer Science, Chicago 1982, pp. 160–164. MR 0780394
.

Files

Files Size Format View
Kybernetika_45-2009-3_13.pdf 945.5Kb application/pdf View/Open
Back to standard record
Partner of
EuDML logo