TY - GEN
T1 - Hiding association rules by using confidence and support
AU - Dasseni, Elena
AU - Verykios, Vassilios S.
AU - Elmagarmid, Ahmed K.
AU - Bertino, Elisa
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2001.
PY - 2001
Y1 - 2001
N2 - Large repositories of data contain sensitive information which must be protected against unauthorized access. Recent advances, in data mining and machine learning algorithms, have increased the disclosure risks one may encounter when releasing data to outside parties. A key problem, and still not sufficiently investigated, is the need to balance the confidentiality of the disclosed data with the legitimate needs of the data users. Every disclosure limitation method affects, in some way, and modifies true data values and relationships. In this paper, we investigate confidentiality issues of a broad category of rules, which are called association rules. If the disclosure risk of some of these rules are above a certain privacy threshold, those rules must be characterized as sensitive. Sometimes, sensitive rules should not be disclosed to the public since, among other things, they may be used for inferencing sensitive data, or they may provide business competitors with an advantage.
AB - Large repositories of data contain sensitive information which must be protected against unauthorized access. Recent advances, in data mining and machine learning algorithms, have increased the disclosure risks one may encounter when releasing data to outside parties. A key problem, and still not sufficiently investigated, is the need to balance the confidentiality of the disclosed data with the legitimate needs of the data users. Every disclosure limitation method affects, in some way, and modifies true data values and relationships. In this paper, we investigate confidentiality issues of a broad category of rules, which are called association rules. If the disclosure risk of some of these rules are above a certain privacy threshold, those rules must be characterized as sensitive. Sometimes, sensitive rules should not be disclosed to the public since, among other things, they may be used for inferencing sensitive data, or they may provide business competitors with an advantage.
UR - http://www.scopus.com/inward/record.url?scp=84947271833&partnerID=8YFLogxK
U2 - 10.1007/3-540-45496-9_27
DO - 10.1007/3-540-45496-9_27
M3 - Conference contribution
AN - SCOPUS:84947271833
SN - 3540427333
SN - 9783540427339
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 369
EP - 383
BT - Information Hiding - 4th International Workshop, IH 2001, Proceedings
A2 - Moskowitz, Ira S.
PB - Springer Verlag
T2 - 4th International Information Hiding Workshop, IHW 2001
Y2 - 25 April 2001 through 27 April 2001
ER -