Abstract
When rules are induced, some rules can be supported only by a very small number of objects. Such rules often correspond to special cases so that supporting objects may be easily estimated. If the rules with small support include some sensitive data, this estimation of objects is not very good in the sense of data privacy. Considering this fact, we investigate utilization of imprecise rules for privacy protection in rule induction. Imprecise rules are rules classifying objects only into a set of possible classes. Utilizing imprecise rules, we propose an algorithm to induce k-anonymous rules, rules with k or more supporting objects. We demonstrate that the accuracy of the classifier with rules induced by the proposed algorithm is not worse than that of the classifier with rules induced by the conventional method. Moreover, the advantage of the proposed method with imprecise rules is examined by comparing other conceivable method with precise rules.
References
Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Morgan Kaufmann, Burlington (2011)
Pawlak, Z.: Rough Sets. Int. J. Comput. Inf. Sci. 11(5), 341–356 (1982)
Inuiguchi, M., Hamakawa, T.: The utilities of imprecise rules and redundant rules for classifiers. In: Huynh, V.-N., et al. (eds.) Knowledge and Systems Engineering. AISC, vol. 245, pp. 45–56. Springer, Heidelberg (2013)
Hamakawa, T, Inuiguchi, M.: On the Utility of Imprecise Rules Induced by MLEM2 in Classification. In: Proceedings of 2014 IEEE International Conference on Granular Computing C, pp. 76–81. IEEE Xplore (2014)
Domingo-Ferrer, J., Torra, V.: Disclosure control methods and information loss for microdata, confidentiality, disclosure, and data access. In: Doyle, P., et al. (eds.) Theory and Practical Applications for Statistical Agencies, pp. 91–110. Elsevier, Amsterdam (2001)
Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)
Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl. Based Sys. 10(5), 557–570 (2002)
Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)
Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)
Yakoubov, S., Gadepally, V., Schear, N., Shen, E., Yerukhimovich, A.: A survey of cryptographic approaches to securing big-data analytics in the cloud. In: Proceedings of 2014 IEEE High Performance Extreme Computing Conference, pp. 1–6. IEEE Xplore (2014)
Zhou, Z., Huang, L., Yun, Y.: Privacy preserving attribute reduction based on rough set. In: Proceedings of 2nd International Workshop on Knowledge Discovery and Data Mining. WKKD 2009, pp. 202–206. AAAI, Portland (2009)
Rokach, L., Schclar, A.: k-anonymized reducts. In: Proceedings of 2010 IEEE International Conference on Granular Computing, pp. 392–395. IEEE Xplore (2010)
Ye, M., Wu, X., Hu, X., Hu, D.: Anonymizing classification data using rough set theory. Knowl. Based Sys. 43, 82–94 (2013)
Grzymala-Busse, J.W.: MLEM2 - discretization during rule induction. In: Klopotek, M.A., Wierzchon, S.T., Trojanowski, K. (eds.) Intelligent Information Processing and Web Mining. AISC, vol. 22, pp. 499–508. Springer, Heidelberg (2003)
UCI Machine Learning Repository. http://archive.ics.uci.edu/ml/
Acknowledgment
This work was partially supported by JSPS KAKENHI Grant Number 26350423.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Inuiguchi, M., Hamakawa, T., Ubukata, S. (2015). Imprecise Rules for Data Privacy. In: Ciucci, D., Wang, G., Mitra, S., Wu, WZ. (eds) Rough Sets and Knowledge Technology. RSKT 2015. Lecture Notes in Computer Science(), vol 9436. Springer, Cham. https://doi.org/10.1007/978-3-319-25754-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-25754-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25753-2
Online ISBN: 978-3-319-25754-9
eBook Packages: Computer ScienceComputer Science (R0)