In this paper we study when the disclosure of data mining results represents, per se, a threat to the anonymity of the individuals recorded in the analyzed database. The novelty of our approach is that we focus on an objective definition of privacy compliance of patterns without any reference to a preconceived knowledge of what is sensitive and what is not, on the basis of the rather intuitive and realistic constraint that the anonymity of individuals should be guaranteed. In particular, the problem addressed here arises from the possibility of inferring from the output of frequent itemset mining (i.e., a set of itemsets with support larger than a threshold s), the existence of patterns with very low support (smaller than an anonymity threshold k). In the following we develop a simple methodology to block such inference opportunities by introducing distortion on the dangerous patterns.

Blocking anonymity threats raised by frequent itemset mining

Atzori M;Bonchi F;Giannotti F;Pedreschi D
2005

Abstract

In this paper we study when the disclosure of data mining results represents, per se, a threat to the anonymity of the individuals recorded in the analyzed database. The novelty of our approach is that we focus on an objective definition of privacy compliance of patterns without any reference to a preconceived knowledge of what is sensitive and what is not, on the basis of the rather intuitive and realistic constraint that the anonymity of individuals should be guaranteed. In particular, the problem addressed here arises from the possibility of inferring from the output of frequent itemset mining (i.e., a set of itemsets with support larger than a threshold s), the existence of patterns with very low support (smaller than an anonymity threshold k). In the following we develop a simple methodology to block such inference opportunities by introducing distortion on the dangerous patterns.
2005
Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo" - ISTI
0-7695-2278-5
H.2.8 Database Applications. Data mining
Algorithms
Frequent Patterns Mining
File in questo prodotto:
File Dimensione Formato  
prod_91178-doc_127757.pdf

solo utenti autorizzati

Descrizione: Blocking anonymity threats raised by frequent itemset mining
Tipologia: Versione Editoriale (PDF)
Dimensione 152.63 kB
Formato Adobe PDF
152.63 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/61348
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact