CFP last date
20 December 2024
Reseach Article

A Classification based Dependent Approach for Suppressing Data

Published on None 2011 by Vamshi Batchu, D.John Aravindhar, J.Thangakumar, Dr.M.Roberts Masillamani
Wireless Information Networks & Business Information System
Foundation of Computer Science USA
WINBIS - Number 1
None 2011
Authors: Vamshi Batchu, D.John Aravindhar, J.Thangakumar, Dr.M.Roberts Masillamani
c0f5f16a-bcca-418e-8691-48aa2023be29

Vamshi Batchu, D.John Aravindhar, J.Thangakumar, Dr.M.Roberts Masillamani . A Classification based Dependent Approach for Suppressing Data. Wireless Information Networks & Business Information System. WINBIS, 1 (None 2011), 14-16.

@article{
author = { Vamshi Batchu, D.John Aravindhar, J.Thangakumar, Dr.M.Roberts Masillamani },
title = { A Classification based Dependent Approach for Suppressing Data },
journal = { Wireless Information Networks & Business Information System },
issue_date = { None 2011 },
volume = { WINBIS },
number = { 1 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 14-16 },
numpages = 3,
url = { /proceedings/winbis/number1/2047-194/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Wireless Information Networks & Business Information System
%A Vamshi Batchu
%A D.John Aravindhar
%A J.Thangakumar
%A Dr.M.Roberts Masillamani
%T A Classification based Dependent Approach for Suppressing Data
%J Wireless Information Networks & Business Information System
%@ 0975-8887
%V WINBIS
%N 1
%P 14-16
%D 2011
%I International Journal of Computer Applications
Abstract

Data mining plays an important role in internet with the computer technology this makes easy to collect the information from the related data sets. The different methods used in this paper are decision tree algorithm, the decision tree algorithm used hears is to classify the data elements by considering a set of constraints, we consider this method to suppress the data by doing so we can secure the data. We extend our work on micro data suppression (1) to prevent not only probabilistic but also decision tree classification based inference, and (2) to handle not only single but also multiple confidential data value suppression to reduce the side-effects. The paper aims to enhance the Data classification and Data Generalization. It shows that how the data is secured using ‘Generalization’ and moreover. It provides efficiency in Data Generalization and discusses some of the major challenges for what kind of data to be suppressed. We consider the following privacy problem: a data holder wants to release a version of data for building classification models, but wants to protect against linking the released data to an external source for inferring sensitive information. The generalized data remains useful to classification but becomes difficult to link to other sources. The generalization space is specified by a hierarchical structure of generalizations. A key is identifying the best generalization to climb up the hierarchy at each iteration. Enumerating all candidate generalizations is impractical.

References
  1. Klein RJ, Proctor SE, Bouderault MA, Turczyn KM. Healthy People 2010 criteria for data suppression. Healthy People 2010 Statistical Notes. No.24. Hyattsville, MD: National Center for Health Statistics; pp. (2002).
  2. “Data mining: Concepts and Techniques”, Jiawei Han, Macheline Kamber, Morgan Kaufmann Publishers, chapter-6, page no 358.pp. (2005)
  3. Aggarwal, C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st VLDB Conference (2005).
  4. Doyle P, Lane JI, Theeuwes JM, Zayatz LM, eds. Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies. Amsterdam, Netherlands: Elsevier Science pp.185–213 (2001).
  5. Ayca Azgin Hintoglu, Yucel Saygın, “Suppressing microdata to prevent classification based inference”, ACM .pp. (2009).
Index Terms

Computer Science
Information Sciences

Keywords

Data classification Data security Data generalization Data mining