{"title":"一种使用数据约束规则的自动数据实用程序聚类方法","authors":"Stuart Morton, M. Mahoui, P. Gibson","doi":"10.1145/2389707.2389710","DOIUrl":null,"url":null,"abstract":"Many data privacy models have been created in the last few years using the k-anonymization methodology including l-diversity, p-sensitive k-anonymity, and t-closeness. While these methods differ in their approaches and quality of the results, they all focus on ensuring the anonymization of the data while at the same time attempt to protect the quality of the data by minimizing the loss of the information contained in the original data set. In this paper, we propose an automated k-anonymity approach that uses clustering to maximize the utility of the data while ensuring that the data privacy is maintained. Our method employs data constraint rules, which are defined by the data research expert to represent especially informative distributions in categorical attributes or inflections points in a continuous attribute. The values of the data constraints are an integral component of our utility function, which is used to maximize the utility of the anonymized dataset. Finally, we present our experimental results that show that our approach meets or exceeds existing methods that do not incorporate data constraint rules.","PeriodicalId":92138,"journal":{"name":"SHB'12 : proceedings of the 2012 ACM International Workshop on Smart Health and Wellbeing : October 29, 2012, Maui, Hawaii, USA. International Workshop on Smart Health and Wellbeing (2012 : Maui, Hawaii)","volume":"3 1","pages":"9-16"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An automated data utility clustering methodology using data constraint rules\",\"authors\":\"Stuart Morton, M. Mahoui, P. Gibson\",\"doi\":\"10.1145/2389707.2389710\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many data privacy models have been created in the last few years using the k-anonymization methodology including l-diversity, p-sensitive k-anonymity, and t-closeness. While these methods differ in their approaches and quality of the results, they all focus on ensuring the anonymization of the data while at the same time attempt to protect the quality of the data by minimizing the loss of the information contained in the original data set. In this paper, we propose an automated k-anonymity approach that uses clustering to maximize the utility of the data while ensuring that the data privacy is maintained. Our method employs data constraint rules, which are defined by the data research expert to represent especially informative distributions in categorical attributes or inflections points in a continuous attribute. The values of the data constraints are an integral component of our utility function, which is used to maximize the utility of the anonymized dataset. Finally, we present our experimental results that show that our approach meets or exceeds existing methods that do not incorporate data constraint rules.\",\"PeriodicalId\":92138,\"journal\":{\"name\":\"SHB'12 : proceedings of the 2012 ACM International Workshop on Smart Health and Wellbeing : October 29, 2012, Maui, Hawaii, USA. International Workshop on Smart Health and Wellbeing (2012 : Maui, Hawaii)\",\"volume\":\"3 1\",\"pages\":\"9-16\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"SHB'12 : proceedings of the 2012 ACM International Workshop on Smart Health and Wellbeing : October 29, 2012, Maui, Hawaii, USA. International Workshop on Smart Health and Wellbeing (2012 : Maui, Hawaii)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2389707.2389710\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"SHB'12 : proceedings of the 2012 ACM International Workshop on Smart Health and Wellbeing : October 29, 2012, Maui, Hawaii, USA. International Workshop on Smart Health and Wellbeing (2012 : Maui, Hawaii)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2389707.2389710","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An automated data utility clustering methodology using data constraint rules
Many data privacy models have been created in the last few years using the k-anonymization methodology including l-diversity, p-sensitive k-anonymity, and t-closeness. While these methods differ in their approaches and quality of the results, they all focus on ensuring the anonymization of the data while at the same time attempt to protect the quality of the data by minimizing the loss of the information contained in the original data set. In this paper, we propose an automated k-anonymity approach that uses clustering to maximize the utility of the data while ensuring that the data privacy is maintained. Our method employs data constraint rules, which are defined by the data research expert to represent especially informative distributions in categorical attributes or inflections points in a continuous attribute. The values of the data constraints are an integral component of our utility function, which is used to maximize the utility of the anonymized dataset. Finally, we present our experimental results that show that our approach meets or exceeds existing methods that do not incorporate data constraint rules.