Title: Data mining performance on perturbed databases: important influences on classification accuracy

Authors: Mohammad Saad Al-Ahmadi, Peter A. Rosen, Rick L. Wilson

Addresses: Department of Accounting and Management Information Systems, College of Industrial Management (CIM), King Fahd University of Petroleum and Minerals (KFUPM), Dhahran 31261, Saudi Arabia. ' School of Business Administration, University of Evansville, 1800 Lincoln Avenue, Evansville, IN 47722, USA. ' Department of Management Science and Information Systems, Spears School of Business, Oklahoma State University, Stillwater, OK 74078, USA

Abstract: Data perturbation via the Generalised Additive Data Perturbation (GADP) method has been shown to be an effective technique for protecting disclosure of confidential attributes in databases. GADP is a viable internal security tool that preserves the statistical relationships in a database while hiding confidential data. Unfortunately, the potential impact of GADP on the ability of data mining tools to discover knowledge in a perturbed database has not been extensively studied. This study fills this gap with a comprehensive investigation of the impact of various factors surrounding databases, data security and data mining. Results support the notion that data perturbation techniques may reduce the ability of data mining tools to accurately find knowledge, and that there are other factors that also influence tool performance. These include the underlying structure of the knowledge to be discovered, the relationship of the tool to this so-called knowledge structure, the degree of noise in the knowledge, and the relationship of the confidential attributes to the knowledge.

Keywords: data mining; generalised additive data perturbation; GADP; neural networks; NNs; discriminant analysis; logistic regression; CART; knowledge structure; noise; classification; information security; computer security; disclosure; confidential data; privacy protection; privacy preservation.

DOI: 10.1504/IJICS.2008.016822

International Journal of Information and Computer Security, 2008 Vol.2 No.1, pp.71 - 85

Published online: 24 Jan 2008 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article