Skip to main content

Imprecise Rules for Data Privacy

  • Conference paper
  • First Online:
Rough Sets and Knowledge Technology (RSKT 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9436))

Included in the following conference series:

Abstract

When rules are induced, some rules can be supported only by a very small number of objects. Such rules often correspond to special cases so that supporting objects may be easily estimated. If the rules with small support include some sensitive data, this estimation of objects is not very good in the sense of data privacy. Considering this fact, we investigate utilization of imprecise rules for privacy protection in rule induction. Imprecise rules are rules classifying objects only into a set of possible classes. Utilizing imprecise rules, we propose an algorithm to induce k-anonymous rules, rules with k or more supporting objects. We demonstrate that the accuracy of the classifier with rules induced by the proposed algorithm is not worse than that of the classifier with rules induced by the conventional method. Moreover, the advantage of the proposed method with imprecise rules is examined by comparing other conceivable method with precise rules.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Morgan Kaufmann, Burlington (2011)

    Google Scholar 

  2. Pawlak, Z.: Rough Sets. Int. J. Comput. Inf. Sci. 11(5), 341–356 (1982)

    Article  Google Scholar 

  3. Inuiguchi, M., Hamakawa, T.: The utilities of imprecise rules and redundant rules for classifiers. In: Huynh, V.-N., et al. (eds.) Knowledge and Systems Engineering. AISC, vol. 245, pp. 45–56. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Hamakawa, T, Inuiguchi, M.: On the Utility of Imprecise Rules Induced by MLEM2 in Classification. In: Proceedings of 2014 IEEE International Conference on Granular Computing C, pp. 76–81. IEEE Xplore (2014)

    Google Scholar 

  5. Domingo-Ferrer, J., Torra, V.: Disclosure control methods and information loss for microdata, confidentiality, disclosure, and data access. In: Doyle, P., et al. (eds.) Theory and Practical Applications for Statistical Agencies, pp. 91–110. Elsevier, Amsterdam (2001)

    Google Scholar 

  6. Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  7. Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl. Based Sys. 10(5), 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  8. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)

    MathSciNet  MATH  Google Scholar 

  10. Yakoubov, S., Gadepally, V., Schear, N., Shen, E., Yerukhimovich, A.: A survey of cryptographic approaches to securing big-data analytics in the cloud. In: Proceedings of 2014 IEEE High Performance Extreme Computing Conference, pp. 1–6. IEEE Xplore (2014)

    Google Scholar 

  11. Zhou, Z., Huang, L., Yun, Y.: Privacy preserving attribute reduction based on rough set. In: Proceedings of 2nd International Workshop on Knowledge Discovery and Data Mining. WKKD 2009, pp. 202–206. AAAI, Portland (2009)

    Google Scholar 

  12. Rokach, L., Schclar, A.: k-anonymized reducts. In: Proceedings of 2010 IEEE International Conference on Granular Computing, pp. 392–395. IEEE Xplore (2010)

    Google Scholar 

  13. Ye, M., Wu, X., Hu, X., Hu, D.: Anonymizing classification data using rough set theory. Knowl. Based Sys. 43, 82–94 (2013)

    Article  Google Scholar 

  14. Grzymala-Busse, J.W.: MLEM2 - discretization during rule induction. In: Klopotek, M.A., Wierzchon, S.T., Trojanowski, K. (eds.) Intelligent Information Processing and Web Mining. AISC, vol. 22, pp. 499–508. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. UCI Machine Learning Repository. http://archive.ics.uci.edu/ml/

Download references

Acknowledgment

This work was partially supported by JSPS KAKENHI Grant Number 26350423.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Masahiro Inuiguchi .

Editor information

Editors and Affiliations

Rights and permissions

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Inuiguchi, M., Hamakawa, T., Ubukata, S. (2015). Imprecise Rules for Data Privacy. In: Ciucci, D., Wang, G., Mitra, S., Wu, WZ. (eds) Rough Sets and Knowledge Technology. RSKT 2015. Lecture Notes in Computer Science(), vol 9436. Springer, Cham. https://doi.org/10.1007/978-3-319-25754-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25754-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25753-2

  • Online ISBN: 978-3-319-25754-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics