Skip to main content
Article thumbnail
Location of Repository

Chapter 5 k-Anonymous Data Mining: A Survey

By V. Ciriani, S. De, Capitani Vimercati, S. Foresti and P. Samarati

Abstract

Keywords: Data mining technology has attracted significant interest as a means of identifying patterns and trends from large collections of data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. Privacy protection in data mining is then becoming a crucial issue that has captured the attention of many researchers. In this chapter, we first describe the concept of k-anonymity and illustrate different approaches for its enforcement. We then discuss how the privacy requirements characterized by k-anonymity can be violated in data mining and introduce possible approaches to ensure the satisfaction of k-anonymity in data mining. k-anonymity, data mining, privacy.

Publisher: 2013-09-21
Year: 2013
OAI identifier: oai:CiteSeerX.psu:10.1.1.352.1377
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://link.springer.com/conte... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.