Privacy in Data Mining
Semantic Microaggregation for the Anonymization of Query Logs
Using Classification Methods to Evaluate Attribute Disclosure Risks
Distributed Privacy-Preserving Methods for Statistical Disclosure Control
Classifying data from protected statistical datasets
Information loss for synthetic data through fuzzy clustering
Privacy-preserving data-mining through micro-aggregation for web-based e-commerce
Publication Type:
Journal ArticleSource:
Internet Research, Emerald Group Publishing Limited, Volume 20, Issue 3, p.366-384 (2010)URL:
http://dx.doi.org/10.1108/10662241011050759Towards Semantic Microaggregation of Categorical Data for Confidential Documents
Publication Type:
Conference ProceedingsSource:
Modeling Decisions for Artificial Intelligence, MDAI 2010, Springer, Volume 6408, Perpignan, France, p.266-276 (2010)URL:
http://www.springerlink.com/content/f41402862155w6t4/Keywords:
Web indexing task; classification task; frequency term vector; k-anonymity preservation; privacy preserving information retrieval; semantic microaggregation; Internet; data privacy; information retrieval; pattern classification; vectorsAbstract:
In the data privacy context, specifically, in statistical disclosure control techniques, microaggregation is a well-known microdata protection method, ensuring the confidentiality of each individual. In this paper, we propose a new approach of microaggregation to deal with semantic sets of categorical data, like text documents. This method relies on the WordNet framework that provides complete semantic relationship taxonomy between words. Therefore, this extension aims ensure the confidentiality of text documents, but at the same time, it should preserve the general meaning. We apply some measures to evaluate the quality of the protection method relying on information loss.
Generation of Synthetic Data by means of Fuzzy c-Regression
A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor
Publication Type:
Conference PaperSource:
24th IFIP TC-11 International Information Security Conference (SEC2009), Springer Boston, Volume 297/2009, Cyprus, p.164-175 (2009)ISBN:
978-3-642-01243-3URL:
http://www.springerlink.com/content/l12k23678011l1t2Keywords:
privacy; anonymity; TorAbstract:
Web browsers are becoming the universal interface to reach
applications and services related with these systems. Different
browsing contexts may be required in order to reach them, e.g., use
of VPN tunnels, corporate proxies, anonymisers, etc. By browsing
\emph{context} we mean how the user browsers the Web, including
mainly the concrete configuration of its browser. When the context
of the browser changes, its security requirements also change. In
this work, we present the use of authorisation policies to
automatise the process of controlling the resources of a Web browser
when its context changes. The objective of our proposal is oriented
towards easing the adaptation to the security requirements of the
new context and enforce them in the browser without the need for
user intervention. We present a concrete application of our work as
a \emph{plug-in} for the adaption of security requirements in
Mozilla/Firefox browser when a context of anonymous navigation
through the Tor network is enabled.
