메뉴 건너뛰기




Volumn 57, Issue 6, 2009, Pages 1496-1509

Against classification attacks: A decision tree pruning approach to privacy protection in data mining

Author keywords

[No Author keywords available]

Indexed keywords

CATEGORICAL ATTRIBUTES; CLASSIFICATION TECHNIQUE; COLLECTIVE BEHAVIOR; CONFIDENTIAL DATA; DATA UTILITIES; DISCLOSURE RISK; EXPERIMENTAL STUDIES; KEY COMPONENT; OPTIMAL PRUNING; PRIVACY PROTECTION; PRIVATE INFORMATION; REAL WORLD DATA; SWAPPING PROCEDURE;

EID: 73649136135     PISSN: 0030364X     EISSN: 15265463     Source Type: Journal    
DOI: 10.1287/opre.1090.0702     Document Type: Article
Times cited : (26)

References (43)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Adam, N. R., J. C. Wortmann. 1989. Security-control methods for statistical databases: A comparative study. ACM Comput. Surveys 21(4) 515-556.
    • (1989) ACM Comput. Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 5
    • 0000082189 scopus 로고
    • Suppression methodology and statistical disclosure control
    • Cox, L. H. 1980. Suppression methodology and statistical disclosure control. J. Amer. Statist. Assoc. 75(370) 377-385.
    • (1980) J. Amer. Statist. Assoc , vol.75 , Issue.370 , pp. 377-385
    • Cox, L.H.1
  • 6
    • 0011702229 scopus 로고
    • Data swapping: A technique for disclosure control
    • Dalenius, T., S. P. Reiss. 1982. Data swapping: A technique for disclosure control. J. Statist. Planning Inference 6(1) 73-85.
    • (1982) J. Statist. Planning Inference , vol.6 , Issue.1 , pp. 73-85
    • Dalenius, T.1    Reiss, S.P.2
  • 7
    • 0020779363 scopus 로고
    • Inference control for statistical databases
    • Denning, D. E., J. Schlörer. 1983. Inference control for statistical databases. Computer 16(7) 69-82.
    • (1983) Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlörer, J.2
  • 10
    • 84952535404 scopus 로고
    • The risk of disclosure for microdata
    • Duncan, G. T., D. Lambert. 1989. The risk of disclosure for microdata. J. Bus. Econom. Statist. 7(2) 201-217.
    • (1989) J. Bus. Econom. Statist , vol.7 , Issue.2 , pp. 201-217
    • Duncan, G.T.1    Lambert, D.2
  • 11
    • 84958048324 scopus 로고    scopus 로고
    • Data swapping: Balancing privacy against precision in mining for logic rules
    • M. Mukesh, A. M. Tjoa, eds, Springer, Berlin
    • Estivill-Castro, V., L. Brankovic. 1999. Data swapping: Balancing privacy against precision in mining for logic rules. M. Mukesh, A. M. Tjoa, eds. Data Warehousing and Knowledge Discovery. Springer, Berlin, 389-398.
    • (1999) Data Warehousing and Knowledge Discovery , pp. 389-398
    • Estivill-Castro, V.1    Brankovic, L.2
  • 12
    • 4344685156 scopus 로고    scopus 로고
    • Genetically engineered decision trees: Population diversity produces smarter trees
    • Fu, Z., B. L. Golden, S. Lele, S. Raghavan, E. A. Wasil. 2003a. Genetically engineered decision trees: Population diversity produces smarter trees. Oper. Res. 51(6) 894-907.
    • (2003) Oper. Res , vol.51 , Issue.6 , pp. 894-907
    • Fu, Z.1    Golden, B.L.2    Lele, S.3    Raghavan, S.4    Wasil, E.A.5
  • 13
    • 0242453778 scopus 로고    scopus 로고
    • A genetic algorithm-based approach for building accurate decision trees
    • Fu, Z., B. L. Golden, S. Lele, S. Raghavan, E. A. Wasil. 2003b. A genetic algorithm-based approach for building accurate decision trees. INFORMS J. Comput. 15(1) 3-22.
    • (2003) INFORMS J. Comput , vol.15 , Issue.1 , pp. 3-22
    • Fu, Z.1    Golden, B.L.2    Lele, S.3    Raghavan, S.4    Wasil, E.A.5
  • 15
    • 34047165799 scopus 로고    scopus 로고
    • Anonymizing classification data for privacy preservation
    • Fung, B. C. M., K. Wang, P. S. Yu. 2007. Anonymizing classification data for privacy preservation. IEEE Trans. Knowledge Data Engrg. 19(5) 711-725.
    • (2007) IEEE Trans. Knowledge Data Engrg , vol.19 , Issue.5 , pp. 711-725
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 17
    • 0036602405 scopus 로고    scopus 로고
    • Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
    • Garfinkel, R., R. Gopal, P. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48(6) 749-764.
    • (2002) Management Sci , vol.48 , Issue.6 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.2    Goes, P.3
  • 18
    • 0036563104 scopus 로고    scopus 로고
    • Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases
    • Gopal, R., R. Garfinkel, P. Goes. 2002. Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases. Oper. Res. 50(3) 501-516.
    • (2002) Oper. Res , vol.50 , Issue.3 , pp. 501-516
    • Gopal, R.1    Garfinkel, R.2    Goes, P.3
  • 19
    • 0002263606 scopus 로고    scopus 로고
    • Privacy: Entitlement or illusion?
    • Greengard, S. 1996. Privacy: Entitlement or illusion? Personnel J. 75(5) 74-88.
    • (1996) Personnel J , vol.75 , Issue.5 , pp. 74-88
    • Greengard, S.1
  • 21
    • 73649087615 scopus 로고    scopus 로고
    • Lerman, C., J. W. Molyneaux, S. Pangemanan, Iswarati. 1991. The determinants of contraceptive method and service point choice. Secondary Analysis of the 1987 National Indonesia Contraceptive Prevalence Survey, I: Fertility and Family Planning. East-West Population Institute, Jakarta, Indonesia.
    • Lerman, C., J. W. Molyneaux, S. Pangemanan, Iswarati. 1991. The determinants of contraceptive method and service point choice. Secondary Analysis of the 1987 National Indonesia Contraceptive Prevalence Survey, Volume I: Fertility and Family Planning. East-West Population Institute, Jakarta, Indonesia.
  • 22
    • 33748519577 scopus 로고    scopus 로고
    • Privacy protection in data mining: A perturbation approach for categorical data
    • Li, X.-B., S. Sarkar. 2006a. Privacy protection in data mining: A perturbation approach for categorical data. Inform. Systems Res. 17(3) 254-270.
    • (2006) Inform. Systems Res , vol.17 , Issue.3 , pp. 254-270
    • Li, X.-B.1    Sarkar, S.2
  • 23
    • 33746873290 scopus 로고    scopus 로고
    • A tree-based data perturbation approach for privacy-preserving data mining
    • Li, X.-B., S. Sarkar. 2006b. A tree-based data perturbation approach for privacy-preserving data mining. IEEE Trans. Knowledge Data Engrg. 18(9) 1278-1283.
    • (2006) IEEE Trans. Knowledge Data Engrg , vol.18 , Issue.9 , pp. 1278-1283
    • Li, X.-B.1    Sarkar, S.2
  • 24
    • 0041311320 scopus 로고    scopus 로고
    • A dynamic programming based pruning method for decision trees
    • Li, X.-B., J. Sweigart, J. Teng, J. Donohue, L. Thombs. 2002. A dynamic programming based pruning method for decision trees. INFORMS J. Comput. 13(4) 332-344.
    • (2002) INFORMS J. Comput , vol.13 , Issue.4 , pp. 332-344
    • Li, X.-B.1    Sweigart, J.2    Teng, J.3    Donohue, J.4    Thombs, L.5
  • 25
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell, Y, B. Pinkas. 2002. Privacy preserving data mining. J. Cryptology 15(3) 177-206.
    • (2002) J. Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 26
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • Liu, K., H. Kargupta, J. Ryan. 2006. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowledge Data Engrg. 18(1) 92-106.
    • (2006) IEEE Trans. Knowledge Data Engrg , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 27
    • 33749607006 scopus 로고    scopus 로고
    • Machanavajjhala, A., J. Gehrke, D. Kifer, M. Venkitasubramaniam. 2006. l-diversity: Privacy beyond k-anonymity. Proc. 22nd IEEE Internat. Conf. Data Engrg. (ICDE 2006). IEEE Computer Science Society, Washington, DC, 24-35.
    • Machanavajjhala, A., J. Gehrke, D. Kifer, M. Venkitasubramaniam. 2006. l-diversity: Privacy beyond k-anonymity. Proc. 22nd IEEE Internat. Conf. Data Engrg. (ICDE 2006). IEEE Computer Science Society, Washington, DC, 24-35.
  • 28
    • 38549090694 scopus 로고    scopus 로고
    • Stochastic protection of confidential information in databases: A hybrid of data perturbation and query restriction
    • Nunez, M. A., R. S. Garfinkel, R. D. Gopal. 2007. Stochastic protection of confidential information in databases: A hybrid of data perturbation and query restriction. Oper. Res. 55(5) 890-908.
    • (2007) Oper. Res , vol.55 , Issue.5 , pp. 890-908
    • Nunez, M.A.1    Garfinkel, R.S.2    Gopal, R.D.3
  • 29
    • 34047166331 scopus 로고    scopus 로고
    • Post-pruning in decision tree induction using multiple performance measures
    • Osei-Bryson, K.-M. 2007. Post-pruning in decision tree induction using multiple performance measures. Comput. Oper Res. 34(11) 3331-3345.
    • (2007) Comput. Oper Res , vol.34 , Issue.11 , pp. 3331-3345
    • Osei-Bryson, K.-M.1
  • 30
    • 73649135739 scopus 로고    scopus 로고
    • Piatetsky-Shapiro, G., D. E. O'Leary, S. Bonorris, W. Klosgen, Y.-T. Khaw, H.-Y. Lee, W. Ziarko. 1995. Knowledge discovery in personal data vs. privacy: A mini-symposium. IEEE Expert 10(2) 46-59.
    • Piatetsky-Shapiro, G., D. E. O'Leary, S. Bonorris, W. Klosgen, Y.-T. Khaw, H.-Y. Lee, W. Ziarko. 1995. Knowledge discovery in personal data vs. privacy: A mini-symposium. IEEE Expert 10(2) 46-59.
  • 32
    • 0021389555 scopus 로고
    • Practical data-swapping: The first steps
    • Reiss, S. P. 1984. Practical data-swapping: The first steps. ACM Trans. Database Systems 9(1) 20-37.
    • (1984) ACM Trans. Database Systems , vol.9 , Issue.1 , pp. 20-37
    • Reiss, S.P.1
  • 33
    • 27344440542 scopus 로고    scopus 로고
    • A unified mathematical programming framework for different statistical disclosure limitation methods
    • Salazar-González, J.-J. 2005. A unified mathematical programming framework for different statistical disclosure limitation methods. Oper. Res. 53(5) 819-829.
    • (2005) Oper. Res , vol.53 , Issue.5 , pp. 819-829
    • Salazar-González, J.-J.1
  • 34
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Samarati, P. 2001. Protecting respondents' identities in microdata release. IEEE Trans. Knowledge Data Engrg. 13(6) 1010-1027.
    • (2001) IEEE Trans. Knowledge Data Engrg , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 35
    • 73649086895 scopus 로고    scopus 로고
    • Data mining and homeland security: An overview
    • January 27. Retrieved July 2006
    • Seifert, J. W. 2006. Data mining and homeland security: An overview. CRS Report for Congress, January 27. Retrieved July 2006, http://www.fas.org/sgp/ crs/intel/RL31798.pdf.
    • (2006) CRS Report for Congress
    • Seifert, J.W.1
  • 37
    • 16444372472 scopus 로고    scopus 로고
    • Impacts of user privacy preferences on personalized systems: A comparative study
    • Kluwer, Dordrecht, The Netherlands
    • Teltzrow, M., A. Kobsa. 2004. Impacts of user privacy preferences on personalized systems: A comparative study. Designing Personalized User Experiences in eCommerce. Kluwer, Dordrecht, The Netherlands, 315-332.
    • (2004) Designing Personalized User Experiences in eCommerce , pp. 315-332
    • Teltzrow, M.1    Kobsa, A.2
  • 38
    • 33746872067 scopus 로고    scopus 로고
    • Retrieved January 2006
    • Torgo, L. 1996. Housing data. Retrieved January 2006, http://www.cs.waikato.ac.nz/ml/weka/.
    • (1996) Housing data
    • Torgo, L.1
  • 40
    • 73649084044 scopus 로고    scopus 로고
    • wide range of uses. Retrieved May
    • U.S. General Accounting Office. 2004. Data mining: Federal efforts cover a wide range of uses. Retrieved May 2006, http://www.gao.gov/new.items/d04548. pdf.
    • (2004) Data mining: Federal efforts cover a
  • 43
    • 73649104404 scopus 로고    scopus 로고
    • AOL executive quits after posting of search data
    • August 23
    • Zeller, T. 2006. AOL executive quits after posting of search data. Internat. Herald Tribune (August 23) 13.
    • (2006) Internat. Herald Tribune , pp. 13
    • Zeller, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.