首页> 外文会议>ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems >Limiting Privacy Breaches in Privacy Preserving Data Mining
【24h】

Limiting Privacy Breaches in Privacy Preserving Data Mining

机译:限制隐私违约,保留数据挖掘

获取原文

摘要

There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One approach for this problem is to randomize the values in individual records, and only disclose the randomized values. The model is then built over the randomized data, after first compensating for the randomization (at the aggregate level). This approach is potentially vulnerable to privacy breaches: based on the distribution of the data, one may be able to learn with high confidence that some of the randomized records satisfy a specified property, even though privacy is preserved on average. In this paper, we present a new formulation of privacy breaches, together with a methodology, "amplification", for limiting them. Unlike earlier approaches, amplification makes it is possible to guarantee limits on privacy breaches without any knowledge of the distribution of the original data. We instantiate this methodology for the problem of mining association rules, and modify the algorithm from [9] to limit privacy breaches without knowledge of the data distribution. Next, we address the problem that the amount of randomization required to avoid privacy breaches (when mining association rules) results in very long transactions. By using pseudorandom generators and carefully choosing seeds such that the desired items from the original transaction are present in the randomized transaction, we can send just the seed instead of the transaction, resulting in a dramatic drop in communication and storage cost. Finally, we define new information measures that take privacy breaches into account when quantifying the amount of privacy preserved by randomization.
机译:在构建精确的数据挖掘模型上,越来越感兴趣地通过总数据,同时保护个人记录水平的隐私。此问题的一种方法是在单个记录中随机化值,并且仅披露随机值。然后在首先补偿随机化(在聚合级别)之后,将模型构建在随机数据上。这种方法可能很容易受到隐私违规的影响:基于数据的分布,可以高度信心地学习一些随机记录满足指定的属性,即使隐私是平均保存的。在本文中,我们提出了一种新的违规行为的制定,以及一种方法,“放大”,以限制它们。与早期的方法不同,放大使得可以保证对隐私泄露的限制而不知道原始数据分配的任何了解。我们将该方法实例化了挖掘关联规则的问题,并修改[9]的算法,以限制隐私漏洞,而无需了解数据分布。接下来,我们解决了避免隐私漏洞所需的随机化量(挖掘关联规则)所需的随机化量会导致非常长的交易。通过使用伪随机发生器并仔细选择种子,使得来自原始交易的所需物品存在于随机交易中,我们可以只发送种子而不是交易,导致通信和存储成本的戏剧下降。最后,我们在量化随机化保留的隐私金额时,我们定义了采取隐私违约的新信息措施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号