CFP last date
20 January 2025
Reseach Article

A Classification based Dependent Approach for Suppressing Data

Published on March 2012 by Vamshi Batchu, D.John Aravindhar, J.Thangakumar, Dr.M.Roberts
Wireless Information Networks & Business Information System (WINBIS 2012)
Foundation of Computer Science USA
WINBIS2012 - Number 1
March 2012
Authors: Vamshi Batchu, D.John Aravindhar, J.Thangakumar, Dr.M.Roberts
fd4f211a-7f66-433b-92bc-a87576390047

Vamshi Batchu, D.John Aravindhar, J.Thangakumar, Dr.M.Roberts . A Classification based Dependent Approach for Suppressing Data. Wireless Information Networks & Business Information System (WINBIS 2012). WINBIS2012, 1 (March 2012), 18-20.

@article{
author = { Vamshi Batchu, D.John Aravindhar, J.Thangakumar, Dr.M.Roberts },
title = { A Classification based Dependent Approach for Suppressing Data },
journal = { Wireless Information Networks & Business Information System (WINBIS 2012) },
issue_date = { March 2012 },
volume = { WINBIS2012 },
number = { 1 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 18-20 },
numpages = 3,
url = { /proceedings/winbis2012/number1/5491-1005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Wireless Information Networks & Business Information System (WINBIS 2012)
%A Vamshi Batchu
%A D.John Aravindhar
%A J.Thangakumar
%A Dr.M.Roberts
%T A Classification based Dependent Approach for Suppressing Data
%J Wireless Information Networks & Business Information System (WINBIS 2012)
%@ 0975-8887
%V WINBIS2012
%N 1
%P 18-20
%D 2012
%I International Journal of Computer Applications
Abstract

Data mining plays an important role in internet with the computer technology this makes easy to collect the information from the related data sets. The different methods used in this paper are decision tree algorithm, the decision tree algorithm used hears is to classify the data elements by considering a set of constraints, we consider this method to suppress the data by doing so we can secure the data. We extend our work on micro data suppression (1) to prevent not only probabilistic but also decision tree classification based inference, and (2) to handle not only single but also multiple confidential data value suppression to reduce the side-effects. The paper aims to enhance the Data classification and Data Generalization. It shows that how the data is secured using ‘Generalization’ and moreover. It provides efficiency in Data Generalization and discusses some of the major challenges for what kind of data to be suppressed. We consider the following privacy problem: a data holder wants to release a version of data for building classification models, but wants to protect against linking the released data to an external source for inferring sensitive information. The generalized data remains useful to classification but becomes difficult to link to other sources. The generalization space is specified by a hierarchical structure of generalizations. A key is identifying the best generalization to climb up the hierarchy at each iteration. Enumerating all candidate generalizations is impractical.

References
  1. Klein RJ, Proctor SE, Bouderault MA, Turczyn KM. Healthy People 2010 criteria for data suppression. Healthy People 2010 Statistical Notes. No.24. Hyattsville, MD: National Center for Health Statistics; pp. (2002).
  2. “Data mining: Concepts and Techniques”, Jiawei Han, Macheline Kamber, Morgan Kaufmann Publishers, chapter-6, page no 358.pp. (2005)
  3. Aggarwal, C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st VLDB Conference (2005).
  4. Doyle P, Lane JI, Theeuwes JM, Zayatz LM, eds. Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies. Amsterdam, Netherlands: Elsevier Science pp.185–213 (2001).
  5. Ayca Azgin Hintoglu, Yucel Sayg?n, “Suppressing microdata to prevent classi?cation based inference”, ACM .pp. (2009).
Index Terms

Computer Science
Information Sciences

Keywords

Data classification Data security Data generalization Data mining