Anonymity preserving sequential pattern mining

Artificial Intelligence and Law 22 (2):141-173 (2014)
  Copy   BIBTEX

Abstract

The increasing availability of personal data of a sequential nature, such as time-stamped transaction or location data, enables increasingly sophisticated sequential pattern mining techniques. However, privacy is at risk if it is possible to reconstruct the identity of individuals from sequential data. Therefore, it is important to develop privacy-preserving techniques that support publishing of really anonymous data, without altering the analysis results significantly. In this paper we propose to apply the Privacy-by-design paradigm for designing a technological framework to counter the threats of undesirable, unlawful effects of privacy violation on sequence data, without obstructing the knowledge discovery opportunities of data mining technologies. First, we introduce a k-anonymity framework for sequence data, by defining the sequence linking attack model and its associated countermeasure, a k-anonymity notion for sequence datasets, which provides a formal protection against the attack. Second, we instantiate this framework and provide a specific method for constructing the k-anonymous version of a sequence dataset, which preserves the results of sequential pattern mining, together with several basic statistics and other analytical properties of the original data, including the clustering structure. A comprehensive experimental study on realistic datasets of process-logs, web-logs and GPS tracks is carried out, which empirically shows how, in our proposed method, the protection of privacy meets analytical utility.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,164

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Navigating the Unknown: Towards a Positive Conception of Anonymity.Julie Ponesse - 2013 - Southern Journal of Philosophy 51 (3):320-344.
Anonymity.Kathleen Wallace - 1999 - Ethics and Information Technology 1 (1):21-31.
Data mining: Proprietary rights, people and proposals.Dinah Payne & Cherie Courseault Trumbach - 2009 - Business Ethics, the Environment and Responsibility 18 (3):241-252.
Mining Privacy and Pattern Matching.Neha Jain & Rajesh Shrivastava - 2012 - In Zdravko Radman (ed.), The Hand. MIT Press. pp. 1--5.
Infinite utility: Insisting on strong monotonicity.Luc Lauwers - 1997 - Australasian Journal of Philosophy 75 (2):222 – 233.
Is anonymity an artifact in ethnographic research?Will C. van den Hoonaard - 2003 - Journal of Academic Ethics 1 (2):141-151.
Anonymity and the Social Self.Steve Matthews - 2010 - American Philosophical Quarterly 47 (4):351 - 363.
Visual Object Detection using Frequent Pattern Mining.A. Yousuf & B. Ravindran - forthcoming - The Proceedings of the Twenty Third Florida Ai Research Society Conference (Flairs 2010).

Analytics

Added to PP
2014-02-16

Downloads
10 (#1,123,760)

6 months
3 (#880,460)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references