Browsing by Author "Clifton, C."
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Item Open Access Multirelational k-anonymity(IEEE, 2007-04) Nergiz, M. Ercan; Clifton, C.; Nergiz, A. Erhank-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much research has been done to modify a single table dataset to satisfy anonymity constraints. This paper extends the definitions of k-anonymity to multiple relations and shows that previously proposed methodologies either fail to protect privacy, or overly reduce the utility of the data, in a multiple relation setting. A new clustering algorithm is proposed to achieve multirelational anonymity. © 2007 IEEE.Item Open Access Multirelational k-anonymity(2009) Nergiz, M.E.; Clifton, C.; Nergiz, A.E.k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous data set, any identifying information occurs in at least k tuples. Much research has been done to modify a single-table data set to satisfy anonymity constraints. This paper extends the definitions of k-anonymity to multiple relations and shows that previously proposed methodologies either fail to protect privacy or overly reduce the utility of the data in a multiple relation setting. We also propose two new clustering algorithms to achieve multirelational anonymity. Experiments show the effectiveness of the approach in terms of utility and efficiency. © 2006 IEEE.Item Open Access Using unknowns to prevent discovery of association rules(2001) Saygin, Y.; Verykios V.S.; Clifton, C.Data mining technology has given us new capabilities to identify correlations in large data sets. This introduces risks when the data is to be made public, but the correlations are private. We introduce a method for selectively removing individual values from a database to prevent the discovery of a set of rules, while preserving the data for other applications. The efficacy and complexity of this method are discussed. We also present an experiment showing an example of this methodology.