Security procedures for classification mining algorithms

  • Authors:
  • Tom Johnsten;Vijay V. Raghavan

  • Affiliations:
  • Computer Science Department, Western Illinois University;Center for Advanced Computer Studies, University of Louisiana Lafayette

  • Venue:
  • Das'01 Proceedings of the fifteenth annual working conference on Database and application security
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Classification mining algorithms can be used to discover protected values from non-protected data that are voluntarily released for mining purposes. We reported earlier on the development of an assessment algorithm, along with a set of security policies, for use in analyzing a protected data element's risk of disclosure with respect to decision-region based algorithms. This paper presents an extension of the previous work. Specifically, two algorithms, one for assessing a protected data element's risk of disclosure with respect to decision-region based algorithms and the other with respect to extended decision-region based algorithms, are developed. The former risk assessment algorithm has a relatively low execution time, but may not achieve an exact assessment of a protected data element's risk of disclosure. However, data collected from initial experiments indicate that the application of this particular assessment algorithm can lead to an exact assessment, under certain security policies.