2009
DOI: 10.1007/978-3-642-10233-2_7
|View full text |Cite
|
Sign up to set email alerts
|

kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity

Abstract: Abstract. k -anonymity is the method used for masking sensitive data which successfully solves the problem of re-linking of data with an external source and makes it difficult to re-identify the individual. Thus kanonymity works on a set of quasi-identifiers (public sensitive attributes), whose possible availability and linking is anticipated from external dataset, and demands that the released dataset will contain at least k records for every possible quasi-identifier value. Another aspect of k is its capabil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Pureness is therefore more suitable than the classiication metric to measure how often the anonymous counterfactual explanation gives us correct advice. We choose the datasets described in Table 5, as they are all tabular datasets that contain various personal attributes through which individuals could be identiied, and are often used in research about privacy-preserving data mining [26,50,51]. 13 All these datasets contain private information such as inancial and health data that people generally do not want to be made public.…”
Section: = ( )mentioning
confidence: 99%
“…Pureness is therefore more suitable than the classiication metric to measure how often the anonymous counterfactual explanation gives us correct advice. We choose the datasets described in Table 5, as they are all tabular datasets that contain various personal attributes through which individuals could be identiied, and are often used in research about privacy-preserving data mining [26,50,51]. 13 All these datasets contain private information such as inancial and health data that people generally do not want to be made public.…”
Section: = ( )mentioning
confidence: 99%
“…Masoumzadeh and Joshi [10] proposed LBS (k, T)-anonymity; and Quoc and Dang [11] proposed eM 2 algorithm based on a Member Migration (MM) technique to satisfy the requirement of k-anonymity and reduce the information loss. Kisilevich et al proposed KACTUS and KACTUS2 in two studies [12], [13] respectively. The two studies lead to the query model based on k-anonymity, expanding and improving the basic anonymous models as it reduces the risk of privacy leakage and improves the effectiveness of data.…”
Section: Related Workmentioning
confidence: 99%
“…Lindell used ID3 algorithm for achieving SMC. Similarly, Kisilevich proposed a KATCUS algorithm based on ID3 decision tree approach [10]. Fong proposed an un-realization technique for sanitization of the dataset and an ID3 algorithm and its modifications are used for privacy preserving decision tree learning [11][12][13].…”
Section: Introductionmentioning
confidence: 99%