Next Article in Journal
Location-Based Deferred Broadcast for Ad-Hoc Named Data Networking
Next Article in Special Issue
Improving Forensic Triage Efficiency through Cyber Threat Intelligence
Previous Article in Journal
Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations
Previous Article in Special Issue
Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Data Anonymization for Hiding Personal Tendency in Set-Valued Database Publication

1
Division of Electrical Engineering and Computer Science, Graduate School of Natural Science and Technology, Kanazawa University, Kanazawa, Ishikawa 920-1192, Japan
2
Faculty of Electrical and Computer Engineering, Institute of Science and Engineering, Kanazawa University, Kanazawa, Ishikawa 920-1192, Japan
*
Author to whom correspondence should be addressed.
Future Internet 2019, 11(6), 138; https://doi.org/10.3390/fi11060138
Submission received: 1 June 2019 / Revised: 18 June 2019 / Accepted: 18 June 2019 / Published: 20 June 2019
(This article belongs to the Special Issue Security and Privacy in Information and Communication Systems)

Abstract

:
Set-valued database publication has been increasing its importance recently due to its benefit for various applications such as marketing analysis and advertising. However, publishing a raw set-valued database may cause individual privacy breach such as the leakage of sensitive information like personal tendencies when data recipients perform data analysis. Even though imposing data anonymization methods such as suppression-based methods and random data swapping methods to such a database can successfully hide personal tendency, it induces item loss from records and causes significant distortion in record structure that degrades database utility. To avoid the problems, we proposed a method based on swapping technique where an individual’s items in a record are swapped to items of the other record. Our swapping technique is distinct from existing one called random data swapping which yields much structure distortion. Even though the technique results in inaccuracy at a record level, it can preserve every single item in a database from loss. Thus, data recipients may obtain all the item information in an anonymized database. In addition, by carefully selecting a pair of records for item swapping, we can avoid excessive record structure distortion that leads to alter database content immensely. More importantly, such a strategy allows one to successfully hide personal tendency without sacrificing a lot of database utility.

1. Introduction

Publishing a set-valued database such as a web access database brings many benefits for various applications like market analysis, advertising and recommender systems. Table 1 shows an example of such a database containing URL’s of individual’s web access as items. To simplify discussion, each URL is expressed by number as its ID. Releasing such a database to the public imposes some challenges since data recipients can directly associate an individual with his/her record to infer personal sensitive information such as personal preference or personal tendency. According to the Oxford on-line dictionary the term tendency refers to an inclination towards certain characteristics or type of behavior. In this context, we consider that individual tendency is an inclination of someone toward certain groups or category of items. For example, a person who accesses to some specific website such as football.com, espn.com, and livescore.com has a tendency to football. Therefore, the more someone accesses to a certain category of websites, the more obvious that the person has a tendency to the category. For some people, their personal tendency toward certain things can be considered as sensitive information and there is a trade-off for disclosing it [1].
Hiding personal tendency in a set-valued database i.e., web access log is essential for security application such as to avoid the Internet users get email spam and phishing. To illustrate the importance of hiding personal tendency we give the following example. An internet user, Bob, accessed various websites where most of the websites that he visited can be categorized as automobile websites, and to this end we can say that Bob has a strong tendency to the automobile category. The web address that Bob accessed are collected by On-line advertisement company, says AdOn. In one day AdOn release the log of the internet users, including Bob’s web access log to its collaborator company, namely AdOff. Unfortunately, an irresponsible agent who is working in AdOff knows the information about Bob’s tendency by analyzing his browsing history and starts to send email spam that contains interesting information about automobiles, as well as inserting a malicious link in the email, due to his curiosity Bob may get in trouble if he clicks the malicious link.
The illustration story tells us that the spammer sends email spam that is precisely related to the targeted personal tendency. However, if Bob’s tendency is hidden, the spammer might fail to trap Bob, since the email spam would not be too precise to Bob’s personal tendency. As a result, even if Bob receives the email he might ignore it and refrain to click a link that does not attract him.
As the nature of a set-valued database where an individual is directly correlated to his/her items, accordingly, prior to publishing such a database to the public, one should consider a data anonymization process such that the personal tendency of individuals can be protected in a published database. Several data anonymization techniques such as generalization based techniques, suppression based techniques, substitution based technique and swapping based techniques have been intensively studied and each of them has pros and cons. However, there are very few researches on hiding personal tendency in set-valued database.
Employing data anonymization techniques by means of a generalization based approach such as k-anonymity [2] and k m -anonymity [3] cannot successfully hide personal tendency even if some items are changed to its general value. Such a failure occurs due to generalization only replaces specific item with its general value i.e., category which still pictures the tendency of an individual. For example, Bob likes to access autocars.net which is categorized as an automobile website, but replacing the website name with its category i.e., automobile, it does not hide that Bob has a tendency toward automobiles. In addition, employing generalization technique such as full domain generalization in set-valued database leads significant reduction in data utility [4] and causes item loss in databases if several items from the same category appear together in one record [5]. As a result, data recipients cannot obtain maximum utility from the database.
Suppression based data anonymization techniques [4,6,7] can be more realistic for hiding personal tendency since certain items in a record are removed so that there is no clue to find the suppressed items. Unfortunately, such a strategy may cause significant distortion in record structure and item loss in the database, making an anonymized database becomes less useful for data recipients. Here record structure refers to the composition or a set of items that construct the records in a database.
The swapping technique moves values or items from a record to another record. The advantage is that it does not reduce the number of items as well as does not cause item loss in a database. Accordingly, we seek a solution to develop an anonymization algorithm based on swapping technique in order to overcome drawbacks of other techniques described above. Moreover, it can hide personal tendency by deeming a personal tendency as a tendency of a different individual. As a result, the individual’s true tendency is hidden and cannot be easily identified.
In this paper, we propose an algorithm that ensures to hide personal tendency while at the same time it does not excessively distort the record structure of an individual. To achieve these properties, we only select a category that has the highest item frequency in a record and swap its items to another record that has a minimum similarity.
The rest of the paper is organized as follows. Section 2 describes several works in protection of individual information and current development of swapping technique. Section 3 and Section 4 discuss the problem that we are going to solve and our proposed method, respectively. Lastly, Section 5 and Section 6 provide experimental results and conclusion, respectively.

2. Related Work

There have been many data anonymization techniques that are proposed to protect personal sensitive information in relational databases and micro datasets [8,9]. While the research in set-valued database anonymization mainly focuses on de-associating records or sensitive items to their data subject. In contrast, there are relatively few methods proposed to protect personal tendency in set-valued databases.

2.1. Protection of Personal Sensitive Information and Personal Tendency

Countless number of methods were proposed to protect personal sensitive information and personal tendency in data publishing scenario. A method to limit privacy breaches on transaction database has been demonstrated in [10]. It can employ pseudorandom generator to construct randomized transactions. The seed of the pseudorandom generator can also work to compress randomization transactions such that the magnitude of randomized transactions does not exceed that of original transactions.
A different privacy protection method in distributed database scenario has also been proposed in [11]. The method called ( I , A ) -privacy constraint ensures that user’s queries in his intention I are hidden from a set A of adversarial principles, i.e., servers and other users due to the restriction mechanism of the relational database. In addition, it is stated in [11] that the implementation of such a method is incredibly time-consuming since it requires the users to enumerate all possible query plans.
Split personality is proposed in [12] to protect personal tendency where the log of users’ queries are split based on their interests so as to result in some multiple personalities. For instance, a user who input queries related to Traveling and on-line shopping categories can be split into two distinct individuals with different personalities, one for the queries about traveling and the other one for the queries about on-line shopping. Even tough the method does not cause item loss from a database, this method distorts the correlation among the items in the record and thus the record structure is drastically changed. Furthermore, such an approach causes a database size to be much larger that leads to degrading much database utility.
The ρ -uncertainty proposed in [7] utilizes partial item suppression based on a heuristic approach which removes only items in sensitive association rules (SAR) to avoid excessive information loss. Even though the method can successfully hide SAR under the parameter ρ , it may cause item loss in an anonymized database. Accordingly, data recipient cannot obtain maximum utility. We present the comparison of our algorithm with others in Table 2.

2.2. Swapping Techniques

Data swapping techniques have been widely used for statistical disclosure control in micro dataset publishing. Even though there is a dispute of its side effect, i.e., the techniques induce information inaccuracy at a record level due to some values of records are swapped to another record. However, such techniques can preserve items in a set-valued database from loss. As a result, data recipients may obtain all information of the items even if the database has been anonymized. In addition, in a set-valued database, the side effect can also bring advantage for certain application like recommender system. When items of an individual are swapped with items from another individual, there is a chance for the individuals to view different things in his/her recommendation list, as a result, the recommender system can increase its serendipity. In recommender system serendipity, it is important to overcome overspecialization problem and broaden user preferences [14].
The pioneering work on data anonymization using swapping technique [9,13] has successfully implemented it to micro datasets for anonymizing numerical and categorical attributes. Another popular swapping method to protect privacy in a micro dataset database is called rank swapping. The method firstly sorts all the values of attribute X in ascending order, then each value v X is swapped randomly with other value v X under the defined range p % of the number v. It is stated in [15] that rank swapping results in better statistical data utility than ordinary data swapping.
Motivated to improve rank swapping, two protection schemes namely rank swapping p-distribution and rank swapping p-buckets are proposed in [16]. The former combines normal probability distribution of the database with defined p % value to swap value v X with other value v X . On the other hand, rank swapping p-buckets splits the sorted values of an attribute ‘X’ into several p buckets. It firstly selects a bucket B s based on a certain probability function and then the values in B s are swapped randomly and uniformly.
Those previously mentioned swapping methods work in micro datasets where in general it only contains a small number of data attributes and therefore it cannot be directly implemented in set-valued databases which usually have a large number of attributes. Moreover, the existing rank swapping techniques rely on randomization to swap the values which cause severe distortion record structure in set-valued databases.
A more recent swapping technique has been implemented to avoid negative association rules [17]. It firstly creates databases to satisfy -diversity [18]. Once the databases satisfy that, the next step is to find all records containing negative association rules and put the records in set Y. Sensitive values in negative association rules that are not compatible are swapped to another record that is compatible with the sensitive attribute in set C. These steps are recursively run until there is no intersection between Y and C.

3. Problem Formulation

A set-valued database D consists of n records t k for k = 1 to n. Each t k is composed of record ID TID, user ID UID and a set IID of item ID’s i obtained from I = { i 1 , i 2 , i d , . . , i | I | }, such that each individual is directly associated with his/her items. Consequently, if such a database is published plainly, malicious data recipients can conduct some data analysis to infer sensitive information such as personal tendency of any individual in D . Note that only IID among the components of t k may be processed during the anonymization. In such a case, we simply use t k as a set of items, e.g., t 3 = {5, 6, 7, 10, 12} in Table 1, if it does not cause confusion.
In real life a person tends to have several preferences, for example, the person may like travelling, on-line shopping or culinary. In our problem formulation, a database owner who publishes his/her database specifies such preference as category. A set of all such categories is denoted by G. Each item in the databases is assigned to one of these categories (see Figure 1). Then we can define personal tendency as follows.
Definition 1.
Personal tendency is a set of categories of items existing in the person’s record. Each category has a weight that is the number of items belonging to the category in a record.
In real situations, given a set-valued database processing items directly is more practical than handling categories in data analysis. Thus, we give another definition as follows.
Definition 2.
Personal tendency is a set of items belonging to a certain category that exists in a record.
To hide personal tendency, we need a data anonymization method like swapping. The swapping refers to selecting items from a record as an itemset and swap the itemset to that of another record. In the case of random swapping, the items are selected randomly, while in our proposed scheme, we select items based on a certain procedure and consider them as an itemset for swapping.
Definition 3.
A swapping method imposed on the database D with n number of t to generate a swapped database D ˜ is said to hide personal tendency if items of a category in a record are swapped to other items of different category in another record in a way such that it cannot be associated to its original data subject.
To avoid excessive distortion of record structure, swapped items should be carefully selected. We give the following definition of hiding personal tendency corresponding to the case that items from a category with the highest frequency are selected.
Definition 4.
A swapping method imposed to database D with n number of t to generate a swapped database D ˜ is said to hide personal tendency with a modest distortion if items of a category that has the highest frequency are swapped to another record in a way such that it cannot be associated to its original data subject.
As an example, based on Figure 1 and Table 1, we can see that a user with UID = 003 has a more tendency toward On-line shopping since the on-line shopping category has two items with IID = {6, 7} while the other category has only one item. Therefore, to avoid excessive record structure distortion, we only swap items from such a category to another record.

3.1. Limitation of Traditional Rank Swapping

Employing traditional rank swapping in set-valued databases is not encouraged since it relies on random swapping of items, which causes significant distortion of record structure. When the structure of records drastically changes, database utility will also be significantly affected specifically for data mining analysis like frequent itemset mining. Moreover, random swapping does not guarantee to result in true swap, that is, items in a record that belong to a specific category are swapped with other items from a different category in another record.
As an example, in the Table 1 we can inspect that UID = 008 has a tendency toward News. If we aim to hide the personal tendency of UID = 008 by swapping its items that belong to News category, i.e., IID = {3, 8} to other items from another record such as UID = 003 which has tendency toward Online shopping since it has IID = {6, 7}, such a swapping can hide the personal tendency of UID = 008 since the swapped items belong to different categories. Therefore, if we rely on a random swapping technique, there is no guarantee to achieve a true swap since there is a possibility that items from the same category are swapped.

3.2. Personal Tendency Similarity

In a database which has several records, an individual record might have a certain degree of similarity with others’ records. This similarity coefficient can be exploited to ensure that the personal tendency can be hidden successfully. Prior to performing the swapping technique, we calculate the Jaccard similarity coefficient, j c , which measures the similarity between two records t k and t k in a database by dividing their intersection items from their union items.
j c ( t k , t k ) = ( t k t k ) ( t k t k ) .
The j c of each pair of t k and t k falls between 0 ≤ j c ( t k , t k ) 1 . The smaller the j c of a pair, the smaller the similarity between them and vice versa. As mentioned in [12], 0.5 or higher is the most suitable Jaccard coefficient value to find high similarity. Intuitively, when items in a record are swapped with items from another record which has high similarity, the personal tendency of an individual is not hidden, since both have almost the same items. Thus, selecting the record which results in the minimum j c value can successfully hide personal tendency. By doing so, the tendency of a person is deemed to be the tendency of another person who has different characteristics. Another advantage of selecting records that result in the minimum j c is to avoid item collision that reduces the number of items in a dataset. It further impacts on data utility in an anonymized dataset.

3.3. Database Utility

Data utility of an anonymized database should also be taken into account since data recipients conduct further data analysis. We should note that every data anonymization results in anonymized databases that have lower data utility than that of the original one. Therefore, the issues in data anonymization are not only ensuring privacy protection in a published database but also preserving data utility after performing data anonymization algorithm.
There are various metrics to measure both issues in literature. Unfortunately, since there are no generic data utility measurements [19], we evaluate the anonymized database utility by using typical applications of data analysis in set-valued databases such as frequent itemset mining [20]. Therefore, we perform frequent itemset mining tasks over original and anonymized databases using the FP-Growth algorithm [21].
To quantify the amount of preserved data utility, one often uses frequent itemset FI that is the itemset appearing in many records of a database. In this case we count the number of frequent itemsets FI from the anonymized databases resulted by our proposed method and other existing methods, as well as that of the original databases. Since swapping items causes information inaccuracy at the record level, we further investigate the effect of the swapping to the information inaccuracy at the record level by evaluating the similarity of frequent itemset mining results using Equation (2). F D and F D ˜ refer to the set of FI in the original database D and that in the anonymized database D ˜ , respectively. When the information inaccuracy at the record level is low, the similarity of the mining result is high. Therefore, the higher the similarity is, the better the dataset utility is preserved in the anonymized databases.
U ( D ˜ , D ) = | F D F D ˜ | | F D F D ˜ | .

3.4. Database Dissimilarity

Database dissimilarity is another side effect of transforming a database into an anonymized one. The database dissimilarity refers to the difference of database content between the original and the anonymized one. To measure the similarity between an original database and anonymized database, we can apply dissimilarity metric D i s s [22]. f D and f D ˜ represent the number of occurrences of item i in original database and that in anonymized database respectively, while d and d ˜ are the total number of distinct items in D and D ˜ , respectively.
D i s s ( D , D ˜ ) = 1 i = 1 d f D ( i ) × i = 1 d f D ( i ) i = 1 d ˜ f D ˜ ( i ) .
In the swapping techniques, the dissimilarity occurs mainly because of items collision. The collision emerges if items that are going to be swapped already exist in another record that has been determined as destination record. Therefore, the content of an anonymized database differs from that of the original one. Our solution to avoid excessive dissimilarity is by selecting a pair of records that has significant items difference for items swapping, such that the items collision can be minimized.

4. Proposed Method

The proposed scheme aims to guarantee the hiding of personal tendency by changing a person’s tendency closer to another person’s tendency while minimizing record structure distortion. To achieve that goal, in this scheme, we first measure the weight of each category based on the frequency of occurrence of items in the same category in a record. The more frequent items within the same category appear in a record, the stronger the tendency of an individual to that category is. We propose two schemes namely partial swapping and full swapping. Refer to Figure 2 to see an illustration of the proposed schemes. At first, the partial swapping is described from Section 4.1, Section 4.2 and Section 4.3. Then the detail of full swapping is described in Section 4.4. In the following discussion personal tendency refers to the Definition 1 except the case that we clearly state it refers to the Definition 2.

4.1. Weighting Individual Tendency

In real life, an individual may have a certain tendency to specific categories, for example in Table 1, Alice who has UID = 004 accesses several websites that belong to some categories such as news, travelling and on-line shopping. However, among the sites that she accessed, traveling category occupies a higher portion than others. Thus, we can say that Alice has a tendency to travelling since it has the highest weight. The weight of a category refers to the number of items belonging to the category in a record.
The number of items in t k is the length | t k | of the record and a website category is denoted by g (refer to Figure 1 as an example). For each t k weight ratio W R t k , g j of each category is computed as shown by (4), where g j is the j-th category in the t k .
W R t k , g j = | { i | i t k i g j } | .

4.2. Item Selection for Partial Swapping

The concept of swapping in this proposal is different from the existing swapping techniques. At first, we count the frequency of items in each t k D based on its category. Thus, we can understand the magnitude of an individual tendency from his/her record.
It is undoubtedly true that randomly swapping items from a record to another record can successfully hide personal tendency. However, such an operation may reduce usefulness of the modified database. To avoid such a negative effect, we introduce our heuristic solution called mean tendency value ( M T V ) which acts as a threshold. The M T V t k is determined for each t k by dividing the record’s length | t k | over the number of categories g j whose items appear in the t k , as shown in Equation (5). For each g j which has weight higher than M T V t k , add all the g j into a bucket C g . After that, we select the g j with the highest weight out of C g as g j and obtain all the items of the selected g j t k as the items for swapping. Such procedures of item selection is shown in Algorithm 1 which outputs a set of I s w a p = { I t k | t k D } where I t k = { i | i t k i g j } .
However, if all the W R t k , g j in t k have equal value with M T V t k , we do not swap any of its items to the other records since there is no significant information to learn about the individual that has an equal tendency to all g j .
M T V t k = | t k | | { g j G | i t k i g j } | ,
where G is a set of all categories of the database as explained in Section 3.
Algorithm 1: Procedure of item selection.
Futureinternet 11 00138 i001

4.3. Destination Record Selection for Partial Swapping

As in Algorithm 2, prior to determining destination record t k to swap the items from t k , we initially collect all the t k D which satisfies condition W R t k , g j > M T V t k as the candidate c t k of destination record and collect them in a bucket C t . The following step is to compute the Jaccard similarity coefficient of the t k with each c t k C t and obtain the minimum j c , j c m i n of t k , using the following equation.
j c m i n ( t k ) = min c t k C t ( t k c t k ) ( t k c t k ) .
Swapping is performed for such a c t k denoted by t k . Algorithm 2 outputs a set P of pairs ( t k , t k ) for all t k D , i.e., P = { ( t k , t k ) | t k D } . There are some requisites to determine c t k C t that can be the best destination record t k to swap i g j of t k . Initially, we check if for each c t k C t the c t k has the same tendency category g with t k . Then, we remove such a c t k from C t . This step guarantees that the t r u e s w a p is achieved. The next requisite is that c t k should result in minimum j c value. The last, c t k should not contain the same items as in g j t k to avoid collision which leads to item loss in c t k that further it impacts to data utility of an anonymized dataset. Once the c t k is determined as t k , the next phase is selecting g j t k which has the highest weight ratio based on Equation (4) and swap the i g j of the t k to t k using Algorithm 3.
Algorithm 2: Procedure of destination record selection for partial swapping.
Futureinternet 11 00138 i002

4.4. Procedure of Full Swapping

A record in set-valued databases may contain arbitrary item i I . Therefore it is necessary to consider a case if individuals have several items from one category only, indicating that the data subject has a very strong tendency to one specific thing. In such a situation we consider to devise an additional algorithm to hide the individual tendency. Still, we emphasize to avoid excessive record distortion.
Before executing Algorithm 4, a set I s w a p of items are selected as I s w a p = { t k D } . Next, a destination record selection is performed by Algorithm 4 as follows. To achieve the goal, we initially calculate the length of each t k . For each t k satisfying | t k | > 1 and containing only one item category # g = 1, append the t k as c t k in a bucket C t . The next step is for each c t k C t compute j c between the t k and c t k . Select the c t k as the selected destination record t k which results in the minimum j c . Once the t k is determined, swap all the items in t k to t k . When the | C t | = 0 which means there are no records satisfying the selection condition of record, full swapping is not possible.
Algorithm 3: Procedure of items swapping.
Futureinternet 11 00138 i003
Algorithm 4: Procedure of destination record selection for full swapping.
Futureinternet 11 00138 i004

5. Experimental Results and Applicability

In this experiment, we used several real datasets that contained user web click B M S - W e b V i e w 1 , B M S 1 and B M S - W e b V i e w 2 , B M S 2 that has been widely used in knowledge engineering research community. We further tested the proposed method to another real dataset W D , containing web access of the Internet users that is generated from W a r p D r i v e project [23]. The detail of the datasets’ properties is available in Table 3, where | D | represents dataset size, | t | ¯ refers to the average item length, while | i D | and | I | are the number of item in dataset and the number of distinct items in dataset, respectively. The experiments were conducted in a computer with processor Intel Core i7 3.4 GHz, RAM 16 GB, and storage 1 TB, under the Windows 7 environment.
To evaluate the effectiveness of our proposed technique P a r t S w a p we compare it with other techniques i.e., random swapping R a n d S w a p which is based on [13], partial suppression P a r t S u p p that follows the idea in [7] and S p l i t P e r s o n from [12]. All the methods were implemented in JAVA code with an additional string similarity library in [24] for computing j c . We ran the program using all those datasets to obtain anonymized datasets B M S 1 ˜ , B M S 2 ˜ and W D ˜ and conduct analysis to evaluate the effect of the data anonymization.

5.1. Item Categorization

Prior to applying the methods, initially we create item categorization for the datasets D like in Figure 1. Ideally, items in a database can be categorized based on their characteristics using a prevalent strategy such as “gates-and-experts” method [25]. However, since the datasets contained only item ID, we follow the idea in [26], that is we create an artificial hierarchal item categorization tree. The tree has a root that represents the most general one i.e., website and it contains 50 categories as its leaves where each leave has equally likely the number of items that randomly selected without any overlapping items among categories from D .

5.2. Data Utility

As we have already stated that there is no generic measurement for quantifying data utility. We applied a typical real-world application in set-valued dataset, that is frequent itemset mining. Therefore, we ran FP-Growth algorithm using s p m f data mining open source software [27] to obtain frequent itemset FI over those three original datasets and their anonymized one.
We determine several support thresholds, ranging from 0.2% to 0.5% to generate FI in B M S 1 and B M S 2 datasets. However, for the W D dataset, the support threshold was ranging from 20% to 50% since the dataset has larger number of items and longer tuple length. We evaluated the obtained mining results from the anonymized dataset using our proposed method and that of other methods and compute their similarity to evaluate data accuracy after applying the anonymization methods using the Jaccard similarity measurement in Equation (2).
Figure 3 shows that the number of FI from all the anonymized datasets was lower than that of the original one. The decrease in the number of FI in the anonymized datasets mainly due to some items being moved or removed from records, as a result, the structure of records in the anonymized database differs from that of the original one. Since the frequent itemset mining depends on the item sequence, consequently, several itemsets that are considered as frequent itemset in original datasets become no longer frequent in the anonymized datasets and vice versa.
Even so, since our proposed method P a r t S w a p only moves items from a certain category which has the highest item frequency in a record to another record, it can successfully maintain the items in the anonymized datasets from loss and minimize record structure distortion. Anonymized databases obtained by P a r t S w a p have a considerably higher number of FI compared with those of P a r t S u p p and S p l i t P e r s o n . Even though S p l i t P e r s o n does not cause item loss, however, it generates new records in datasets the size of the datasets increases drastically. As the results the number of generated FI under the same support threshold becomes very low. On the other hand, since R a n d S w a p also uses swapping strategy to move items from a record to another, it does not cause item loss. As a result, the method also achieves a significantly higher number of FI.
Figure 4 shows that the method always results in higher similarity results. It is indicating that the method results in lower inaccuracy at a record level compared with others. As a result, the obtained FI from the anonymized datasets B M S 1 ˜ - P a r t S w a p , B M S 2 ˜ - P a r t S w a p , W D ˜ - P a r t S w a p using the proposed method have the highest number of identical frequent itemset to the original one. Note that we can also observe the following results from our simulation. Even though the proposed method yields the highest number of identical FI, it does not always result in the highest number of FI in the anonymized datasets among all considered methods.
The most prominent feature of our proposed method is that it works very well in a dataset that has a high number of distinct items and a high number of average tuple length. This is because our method selectively determines a pair of record for items swapping and only swap items from a category that has higher item frequency, such that inaccuracy in record level can be minimized. Therefore, we can confirm that due to P a r t S w a p results in lower inaccuracy, it successfully preserves higher data utility than other methods.

5.3. Data Dissimilarity

Data dissimilarity represents how far the original datasets have been changed to obtain anonymized datasets. To evaluate dissimilarity D i s s , we use the measurement adopted in [22]. In data swapping technique, the data dissimilarity occurs mainly due to item collision in the swapping process. The collision arises when swapped items already exist in the record destination. Figure 5 shows a comparison of D i s s values among the anonymized datasets. It represents that our proposed algorithm P a r t S w a p achieves lower D i s s values compared with that of R a n d S w a p and P a r t S u p p . Such a result can be obtained due to P a r t S w a p only swaps items of a category that has the highest item frequency to other items from a different record that has the smallest j c . Thus, it can avoid a significant number of item loss in D ˜ and minimize the D i s s values. Since S p l i t P e r s o n does not swap or remove items from datasets, instead, it only splits certain record into several different records the D i s s value resulted from the method is always zero. On the other hand, P a r t S u p p always results in the highest dissimilarity values due to it removes items from the datasets, making the items no longer exist in the anonymized datasets.

5.4. Computational Time

To evaluate the efficiency of our proposed method, we measure computational time for hiding personal tendency. The computational time for S p l i t P e r s o n has achieved the lowest since the method straightforwardly identifies records in the datasets and split the record containing several personal tendencies into several different records. P a r t S u p p also requires small computational time due to the method only performs item suppression to the records. On the other hand, to successfully hide the personal tendency R a n d S w a p takes the longest computational time since it needs to determine random numbers and assigned them to each record prior to performing items swapping. Prominently, our proposed method requires lower computational time than that of R a n d S w a p since it only needs to calculate j c value between t k and each t k and selects a pair of records that result in the smallest j c . Therefore, the computation time can be reduced.
Figure 6 shows that to generate B M S 1 ˜ all the methods are able to compute it with quite low computational time since the average tuple length and the number of distinct items in the dataset is small. However, to achieve B M S 2 ˜ the computational time drastically increases since the datasets have more number of distinct items and also the average length is higher. Even though the number of record in W D dataset is small, it has the largest number of distinct item and the longest average record length so that to achieve W D ˜ all the methods require higher computational time.

5.5. Applicability of the Proposed Method

The proposed algorithm uses weight ratio, W R t k , g j and mean tendency value, M T V t k , both of which can be computed for any set-valued database. After finding category g j having the maximum weight, the algorithm search for a record as a destination record t k for item swapping. Following that, swapping the selected items from t k and t k is executed.
In a certain set-valued database the proposed algorithm cannot perform swapping. To guarantee usefulness of the modified database only categories in a record having the weight ratio higher than M T V t k , i.e., W R t k , g j > M T V t k , are processed for item selection in Section 1. The same inequality is used for selecting destination record t k in Section 4.3. Suppose g 1 , g 2 , . . , g m are categories of items in t k and their item frequency in t k are f 1 , f 2 , . . . , f m , respectively. From the Equations (4) and (5), the condition that t k in a database does not satisfy the inequality W R t k , g j > M T V t k becomes j = 1 m f j m f j for all j { 1 , . . . , m } , i.e f j j = 1 j j m f j m 1 for all j { 1 , . . . , m } . Under this condition the Algorithms 1 and 2 cannot output respective I t k and a pair of P for the t k . In this situation the swapping cannot be executed for that t k in the database. A database is not suitable for swapping by the proposed method if most of the t k in the database cannot be used for swapping because of the condition. For example if all individual records in a database containing categories that have uniform weight, no records can satisfy the condition W R t k , g j > M T V t k . As a result the algorithm cannot perform item swapping.
On the other hand, the proposed algorithm needs to compute Jaccard similarity coefficient for all pairs of t k and t k and as the number of records becomes large, its computational time increases. In this sense, the database size should not be too large.

6. Conclusions

In this paper, we have proposed a data anonymization method for hiding personal tendency in set-valued database publication. Our approach successfully hides personal tendency by exploiting Jaccard similarity coefficient among records in datasets and swapping items from a certain category in a record to other items from different category in a targeted record.
In addition, by swapping only items from a category that has the highest frequency in a record the distortion of record structure in the anonymized database can be minimized, as a result, it successfully preserves higher data utility and results in smaller dissimilarity values.
Even though the swapping techniques always result in inaccuracy at a record level, it can bring advantage for data recipients since they can obtain all information about the items even if the database has been anonymized. The swapping technique is also beneficial for certain application such as recommender systems to increase user serendipity as a solution to avoid overspecialization and broaden user preferences.
In terms of the computational time, our proposed method requires considerably lower computational time compared with that of existing swapping technique. The main reason is that the proposed method measures the Jaccard similarity coefficient of each pair of records and takes the pair that has the smallest similarity coefficient value for items swapping. It is also important to note that the size, the number of distinct items and the record length of databases greatly affect the computational time.

Author Contributions

D.G. devised the problem and reviewed related work, designed the solution and programmed the simulation application, wrote the original draft, and reviewed and edited the draft. M.M. designed idea, gave improvement, reviewed and edited the draft as well as supervised the overall quality of the article.

Acknowledgments

The research results have been partially achieved by WarpDrive: Web-based Attack Response with Practical and Deployable Research InitiatiVE, the Commissioned Research of National Institute of Information and Communications Technology (NICT), JAPAN. The first author thanks to BUDI-LN scholarship from Indonesia Endowment Fund for Education (LPDP) and Ministry of Research, Technology and Higher Education of Republic of Indonesia (RISTEKDIKTI).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Li, H.; Sarathy, R.; Xu, H. The Role of Affect and Cognition on Online Consumers’ Decision to Disclose Personal Information to Unfamiliar Online Vendors. Decis. Support Syst. 2011, 51, 434–445. [Google Scholar] [CrossRef]
  2. Sweeney, L. K-anonymity: A Model For Protecting Privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 2002, 10, 557–570. [Google Scholar] [CrossRef]
  3. Terrovitis, M.; Mamoulis, N.; Kalnis, P. Privacy-preserving anonymization of set-valued data. Proc. VLDB Endow. 2008, 1, 115–125. [Google Scholar] [CrossRef] [Green Version]
  4. Xu, Y.; Fung, B.C.M.; Wang, K.; Fu, A.W.C.; Pei, J. Publishing Sensitive Transactions for Itemset Utility. In Proceedings of the 2008 Eighth ICDM ’08 IEEE International Conference on Data Mining, Pisa, Italy, 15–19 December 2008; IEEE Computer Society: Washington, DC, USA, 2008; pp. 1109–1114. [Google Scholar] [Green Version]
  5. Liu, J.Q. Publishing set-valued data against realistic adversaries. J. Comput. Sci. Technol. 2012, 27, 24–36. [Google Scholar] [CrossRef]
  6. LeFevre, K.; DeWitt, D.J.; Ramakrishnan, R. Incognito: Efficient Full-Domain K-Anonymity. In SIGMOD Conference; Özcan, F., Ed.; ACM: New York, NY, USA, 2005; pp. 49–60. [Google Scholar]
  7. Jia, X.; Pan, C.; Xu, X.; Zhu, K.Q.; Lo, E. Suppression. In International Conference on Database Systems for Advanced Applications; Springer: Berlin, Germany, 2014; pp. 188–202. [Google Scholar]
  8. Ghinita, G.; Kalnis, P.; Tao, Y. Anonymous Publication of Sensitive Transactional Data. IEEE Trans. Knowl. Data Eng. 2011, 23, 161–174. [Google Scholar] [CrossRef]
  9. Reiss, S.P.; Post, M.J.; Dalenius, T. Non-reversible Privacy Transformations. In Proceedings of the 1st ACM PODS ’82 SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, CA, USA, 29–31 March 1982; ACM: New York, NY, USA, 1982; pp. 139–146. [Google Scholar]
  10. Evfimievski, A.; Gehrke, J.; Srikant, R. Limiting privacy breaches in privacy preserving data mining. Pods 2003, 211–222. [Google Scholar] [CrossRef] [Green Version]
  11. Farnan, N.L.; Lee, A.J.; Chrysanthis, P.K.; Yu, T. Don’t Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing. In Computer Security–ESORICS 2011; Atluri, V., Diaz, C., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 628–647. [Google Scholar]
  12. Adar, E. User 4xxxxx9: Anonymizing query logs. In Proceedings of the of Query Log Analysis Workshop, International Conference on World Wide Web, Banff, AB, Canada, 8–12 May 2007. [Google Scholar]
  13. Reiss, S.P. Practical Data-swapping: The First Steps. ACM Trans. Database Syst. 1984, 9, 20–37. [Google Scholar] [CrossRef]
  14. Kotkov, D.; Wang, S.; Veijalainen, J. A Survey of Serendipity in Recommender Systems. Know.-Based Syst. 2016, 111, 180–192. [Google Scholar] [CrossRef]
  15. Domingo-Ferrer, J.; Torra, V. Theory and Practical Applications for Statistical Agencies, Chapter A Quantitative Comparison of Disclosure Control Methods for Microdata, Confidentiality, Disclosure and Data Access; Elsevier: Amsterdam, The Netherlands, 2002. [Google Scholar]
  16. Nin, J.; Herranz, J.; Torra, V. Rethinking rank swapping to decrease disclosure risk. Data Knowl. Eng. 2008, 64, 346–364. [Google Scholar] [CrossRef]
  17. Hasan, A.S.M.T.; Jiang, Q.; Luo, J.; Li, C.; Chen, L. An Effective Value Swapping Method for Privacy Preserving Data Publishing. Secur. Commun. Netw. 2016, 9, 3219–3228. [Google Scholar] [CrossRef]
  18. Machanavajjhala, A.; Kifer, D.; Gehrke, J.; Venkitasubramaniam, M. L-diversity: Privacy Beyond K-anonymity. ACM Trans. Knowl. Discov. Data 2007, 1. [Google Scholar] [CrossRef]
  19. Domingo-Ferrer, J.; Torra, V. Disclosure Risk Assessment in Statistical Data Protection. J. Comput. Appl. Math. 2004, 164-165, 285–293. [Google Scholar] [CrossRef]
  20. Nakagawa, T.; Arai, H.; Nakagawa, H. Personalized Anonymization for Set-Valued Data by Partial Suppression. Trans. Data Priv. 2018, 11, 219–237. [Google Scholar]
  21. Han, J.; Pei, J.; Yin, Y. Mining Frequent Patterns Without Candidate Generation. SIGMOD Rec. 2000, 29, 1–12. [Google Scholar] [CrossRef]
  22. Oliveira, S.R.M.; Zaiane, O.R. Privacy Preserving Frequent Itemset Mining. In Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining (PSDM 2002), Maebashi City, Japan, 9 December 2002; Clifton, C., Estivill-Castro, V., Eds.; ACS: Maebashi City, Japan, 2002; Volume 14, pp. 43–54. [Google Scholar]
  23. WarpDrive-Project. Web-Based Attack Response with Practical and Deployable Research Initiative. 2018. Available online: https://warpdrive-project.jp/ (accessed on 1 June 2018).
  24. Debatty, T. Java String Similarity. 2014. Available online: https://github.com/tdebatty/java-string-similarity (accessed on 14 October 2018).
  25. Shen, D.; Ruvini, J.D.; Somaiya, M.; Sundaresan, N. Item Categorization in the e-Commerce Domain. In Proceedings of the 20th CIKM ’11 ACM International Conference on Information and Knowledge Management, Glasgow, UK, 24–28 October 2011; ACM: New York, NY, USA, 2011; pp. 1921–1924. [Google Scholar]
  26. He, Y.; Naughton, J.F. Anonymization of Set-Valued Data via Top-Down, Local Generalization. Proc. VLDB Endow. 2009, 2, 934–945. [Google Scholar] [CrossRef]
  27. Fournier-Viger, P.; Lin, J.C.; Gomariz, A.; Gueniche, T.; Soltani, A.; Deng, Z.; Lam, H.T. The SPMF Open-Source Data Mining Library Version 2. In Proceedings of the Part III Machine Learning and Knowledge Discovery in Databases–European Conference, ECML PKDD 2016, Riva del Garda, Italy, 19–23 September 2016; pp. 36–40. [Google Scholar]
Figure 1. Website category.
Figure 1. Website category.
Futureinternet 11 00138 g001
Figure 2. Swapping strategy.
Figure 2. Swapping strategy.
Futureinternet 11 00138 g002
Figure 3. Comparison of the number of frequent itemset in anonymized datasets and original datasets.
Figure 3. Comparison of the number of frequent itemset in anonymized datasets and original datasets.
Futureinternet 11 00138 g003
Figure 4. Comparison of the frequent itemset similarity among anonymized datasets to the original datasets.
Figure 4. Comparison of the frequent itemset similarity among anonymized datasets to the original datasets.
Futureinternet 11 00138 g004
Figure 5. D i s s comparison among the anonymized datasets.
Figure 5. D i s s comparison among the anonymized datasets.
Futureinternet 11 00138 g005
Figure 6. Required computational time to generate D ˜ among different methods.
Figure 6. Required computational time to generate D ˜ among different methods.
Futureinternet 11 00138 g006
Table 1. An example of visited URL’s.
Table 1. An example of visited URL’s.
TIDUIDIID
10012 3 8 10 11
20022 7 8 10
30035 6 7 10 12
40044 6 7 9 10 12
50051 3 5 8 11
60062 3 8 9
70071 4 6 7 9 12
80083 4 7 8 11
90092 6 9 12
100101 3 5 9 10
Table 2. Comparison of methods protecting personal sensitive information and personal tendency.
Table 2. Comparison of methods protecting personal sensitive information and personal tendency.
MethodDatabase TypeTechniqueRecord StructureNo. of Records
( I , A ) -privacy [11]RelationalAccess control queryPreservedKept
Amplification [10]Set-valuedRandomization and noise additionChangedIncrease
Split personality [12]Set-valuedSplitting recordChangedIncrease
ρ -uncertainty [7]Set-valuedSuppressing itemsChangedDecrease
Rank swapping [13]MicrodataRandom based swappingChangedKept
Proposed methodSet-valuedSimilarity based swappingChangedKept
Table 3. Properties of D .
Table 3. Properties of D .
PropertiesDatasets D
BMS 1 BMS 2 WD
| D | 50005000797
| i D | 12,82123,530174,499
| I | 264271726,506
0 p t 2 . 5 e x | t | ¯ 2.564.70218.94

Share and Cite

MDPI and ACS Style

Gunawan, D.; Mambo, M. Data Anonymization for Hiding Personal Tendency in Set-Valued Database Publication. Future Internet 2019, 11, 138. https://doi.org/10.3390/fi11060138

AMA Style

Gunawan D, Mambo M. Data Anonymization for Hiding Personal Tendency in Set-Valued Database Publication. Future Internet. 2019; 11(6):138. https://doi.org/10.3390/fi11060138

Chicago/Turabian Style

Gunawan, Dedi, and Masahiro Mambo. 2019. "Data Anonymization for Hiding Personal Tendency in Set-Valued Database Publication" Future Internet 11, no. 6: 138. https://doi.org/10.3390/fi11060138

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop