Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques: Chapman & Hall/CRC Data Mining and Knowledge Discovery, cartea 17
Autor Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fuen Limba Engleză Hardback – 31 iul 2010
The first part of the book discusses the fundamentals of the field. In the second part, the authors present anonymization methods for preserving information utility for specific data mining tasks. The third part examines the privacy issues, privacy models, and anonymization methods for realistic and challenging data publishing scenarios. While the first three parts focus on anonymizing relational data, the last part studies the privacy threats, privacy models, and anonymization methods for complex data, including transaction, trajectory, social network, and textual data.
This book not only explores privacy and information utility issues but also efficiency and scalability challenges. In many chapters, the authors highlight efficient and scalable methods and provide an analytical discussion to compare the strengths and weaknesses of different solutions.
Preț: 1011.81 lei
Preț vechi: 1264.77 lei
-20% Nou
Puncte Express: 1518
Preț estimativ în valută:
179.05€ • 209.95$ • 157.24£
179.05€ • 209.95$ • 157.24£
Carte tipărită la comandă
Livrare economică 31 ianuarie-14 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781420091489
ISBN-10: 1420091484
Pagini: 376
Ilustrații: 55 b/w images, 102 tables and N/A Hybrid Book
Dimensiuni: 157 x 236 x 23 mm
Greutate: 0.66 kg
Ediția:New.
Editura: CRC Press
Seriile Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, Chapman & Hall/CRC Data Mining and Knowledge Discovery
ISBN-10: 1420091484
Pagini: 376
Ilustrații: 55 b/w images, 102 tables and N/A Hybrid Book
Dimensiuni: 157 x 236 x 23 mm
Greutate: 0.66 kg
Ediția:New.
Editura: CRC Press
Seriile Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, Chapman & Hall/CRC Data Mining and Knowledge Discovery
Public țintă
Researchers and advanced undergraduate and graduate students in computer science, data mining, database management, and information security; database administrators, database architects, information engineers, and chief information officers.Cuprins
THE FUNDAMENTALS
Introduction
Data Collection and Data Publishing
What Is Privacy-Preserving Data Publishing?
Related Research Areas
Attack Models and Privacy Models
Record Linkage Model
Attribute Linkage Model
Table Linkage Model
Probabilistic Model
Modeling Adversary’s Background Knowledge
Anonymization Operations
Generalization and Suppression
Anatomization and Permutation
Random Perturbation
Information Metrics
General Purpose Metrics
Special Purpose Metrics
Trade-Off Metrics
Anonymization Algorithms
Algorithms for the Record Linkage Model
Algorithms for the Attribute Linkage Model
Algorithms for the Table Linkage Model
Algorithms for the Probabilistic Attack
Attacks on Anonymous Data
ANONYMIZATION FOR DATA MINING
Anonymization for Classification Analysis
Introduction
Anonymization Problems for Red Cross BTS
High-Dimensional Top-Down Specialization (HDTDS)
Workload-Aware Mondrian
Bottom-Up Generalization
Genetic Algorithm
Evaluation Methodology
Summary and Lesson Learned
Anonymization for Cluster Analysis
Introduction
Anonymization Framework for Cluster Analysis
Dimensionality Reduction-Based Transformation
Related Topics
Summary
EXTENDED DATA PUBLISHING SCENARIOS
Multiple Views Publishing
Introduction
Checking Violations of k-Anonymity on Multiple Views
Checking Violations with Marginals
Multi-Relational k-Anonymity
Multi-Level Perturbation
Summary
Anonymizing Sequential Releases with New Attributes
Introduction
Monotonicity of Privacy
Anonymization Algorithm for Sequential Releases
Extensions
Summary
Anonymizing Incrementally Updated Data Records
Introduction
Continuous Data Publishing
Dynamic Data Republishing
HD-Composition
Summary
Collaborative Anonymization for Vertically Partitioned Data
Introduction
Privacy-Preserving Data Mashup
Cryptographic Approach
Summary and Lesson Learned
Collaborative Anonymization for Horizontally Partitioned Data
Introduction
Privacy Model
Overview of the Solution
Discussion
ANONYMIZING COMPLEX DATA
Anonymizing Transaction Data
Introduction
Cohesion Approach
Band Matrix Method
km-Anonymization
Transactional k-Anonymity
Anonymizing Query Logs
Summary
Anonymizing Trajectory Data
Introduction
LKC-Privacy
(k, δ)-Anonymity
MOB k-Anonymity
Other Spatio-Temporal Anonymization Methods
Summary
Anonymizing Social Networks
Introduction
General Privacy-Preserving Strategies
Anonymization Methods for Social Networks
Data Sets
Summary
Sanitizing Textual Data
Introduction
ERASE
Health Information DE-identification (HIDE)
Summary
Other Privacy-Preserving Techniques and Future Trends
Interactive Query Model
Privacy Threats Caused by Data Mining Results
Privacy-Preserving Distributed Data Mining
Future Directions
References
Introduction
Data Collection and Data Publishing
What Is Privacy-Preserving Data Publishing?
Related Research Areas
Attack Models and Privacy Models
Record Linkage Model
Attribute Linkage Model
Table Linkage Model
Probabilistic Model
Modeling Adversary’s Background Knowledge
Anonymization Operations
Generalization and Suppression
Anatomization and Permutation
Random Perturbation
Information Metrics
General Purpose Metrics
Special Purpose Metrics
Trade-Off Metrics
Anonymization Algorithms
Algorithms for the Record Linkage Model
Algorithms for the Attribute Linkage Model
Algorithms for the Table Linkage Model
Algorithms for the Probabilistic Attack
Attacks on Anonymous Data
ANONYMIZATION FOR DATA MINING
Anonymization for Classification Analysis
Introduction
Anonymization Problems for Red Cross BTS
High-Dimensional Top-Down Specialization (HDTDS)
Workload-Aware Mondrian
Bottom-Up Generalization
Genetic Algorithm
Evaluation Methodology
Summary and Lesson Learned
Anonymization for Cluster Analysis
Introduction
Anonymization Framework for Cluster Analysis
Dimensionality Reduction-Based Transformation
Related Topics
Summary
EXTENDED DATA PUBLISHING SCENARIOS
Multiple Views Publishing
Introduction
Checking Violations of k-Anonymity on Multiple Views
Checking Violations with Marginals
Multi-Relational k-Anonymity
Multi-Level Perturbation
Summary
Anonymizing Sequential Releases with New Attributes
Introduction
Monotonicity of Privacy
Anonymization Algorithm for Sequential Releases
Extensions
Summary
Anonymizing Incrementally Updated Data Records
Introduction
Continuous Data Publishing
Dynamic Data Republishing
HD-Composition
Summary
Collaborative Anonymization for Vertically Partitioned Data
Introduction
Privacy-Preserving Data Mashup
Cryptographic Approach
Summary and Lesson Learned
Collaborative Anonymization for Horizontally Partitioned Data
Introduction
Privacy Model
Overview of the Solution
Discussion
ANONYMIZING COMPLEX DATA
Anonymizing Transaction Data
Introduction
Cohesion Approach
Band Matrix Method
km-Anonymization
Transactional k-Anonymity
Anonymizing Query Logs
Summary
Anonymizing Trajectory Data
Introduction
LKC-Privacy
(k, δ)-Anonymity
MOB k-Anonymity
Other Spatio-Temporal Anonymization Methods
Summary
Anonymizing Social Networks
Introduction
General Privacy-Preserving Strategies
Anonymization Methods for Social Networks
Data Sets
Summary
Sanitizing Textual Data
Introduction
ERASE
Health Information DE-identification (HIDE)
Summary
Other Privacy-Preserving Techniques and Future Trends
Interactive Query Model
Privacy Threats Caused by Data Mining Results
Privacy-Preserving Distributed Data Mining
Future Directions
References
Notă biografică
Benjamin C. M. Fung is an assistant professor in the Concordia Institute for Information Systems Engineering at Concordia University in Montreal, Quebec. Dr. Fung is also a research scientist and the treasurer of the National Cyber-Forensics and Training Alliance Canada (NCFTA Canada).
Ke Wang is a professor in the School of Computing Science at Simon Fraser University in Burnaby, British Columbia.
Ada Wai-Chee Fu is an associate professor in the Department of Computer Science and Engineering at the Chinese University of Hong Kong.
Philip S. Yu is a professor in the Department of Computer Science and the Wexler Chair in Information and Technology at the University of Illinois at Chicago.
Ke Wang is a professor in the School of Computing Science at Simon Fraser University in Burnaby, British Columbia.
Ada Wai-Chee Fu is an associate professor in the Department of Computer Science and Engineering at the Chinese University of Hong Kong.
Philip S. Yu is a professor in the Department of Computer Science and the Wexler Chair in Information and Technology at the University of Illinois at Chicago.
Descriere
"Introduction to Privacy-Preserving Data Publishing" presents state-of-the-art information sharing and data integration methods that take into account privacy and data mining requirements.