dc.contributor.advisor | Aydos, Murat | |
dc.contributor.author | Vural, Yılmaz | |
dc.date.accessioned | 2018-10-11T06:57:20Z | |
dc.date.available | 2018-10-11T06:57:20Z | |
dc.date.issued | 2017-06-23 | |
dc.date.submitted | 2017-06-23 | |
dc.identifier.uri | http://hdl.handle.net/11655/5240 | |
dc.description.abstract | Data privacy is a difficult problem that tries to find the best balance between the privacy
risks of data owners and the utility of data sharing to the third parties. Anonymization is the
most commonly applied technique to overcome data privacy problems. The equivalence
classes, the natural outcome of anonymization process, are classified according to the data
utility in two main categories: Utility and Outlier Equivalence Classes (UEC, OEC). The
utility equivalence class contains records that have been suppressed by anonymization
techniques for privacy concerns. Meanwhile, the outlier equivalence class contains records
that have been fully suppressed by anonymization techniques resulting in no data utility. In
this study, ρ-Gain model, which focus on the effect of outlier equivalence class for increasing
data utility, was proposed. In the proposed model, k-Anonymity, ℓ-Diversity and t-Closeness
privacy models were used together with ρ-iterations to reduce the privacy risks. The Average
Equivalence Class metric was used to measure data utility. According to the findings
obtained from the study, the ρ-Gain model improved the data utility, but did not cause a
significant negative impact on privacy risk estimates. With the use of the proposed ρ-Gain
model as an anonymization technique, we have shown that the data utility has improved
while keeping the data privacy risk with no significant change. | tr_TR |
dc.description.tableofcontents | İÇİNDEKİLER
Sayfa
ÖZET ...................................................................................................................................... i
ABSTRACT ......................................................................................................................... iii
TEŞEKKÜR ......................................................................................................................... iv
İÇİNDEKİLER ...................................................................................................................... v
ÇİZELGELER LİSTESİ .................................................................................................... viii
ŞEKİLLER LİSTESİ ............................................................................................................. x
SİMGELER VE KISALTMALAR .................................................................................... xiii
1 GENEL BİLGİLER ....................................................................................................... 1
1.1 Mevcut Problem ........................................................................................................... 1
1.2 Tezin Amaç ve Hedefleri ............................................................................................. 2
1.3 Tezin Kapsamı ............................................................................................................. 2
1.4 Tezin Yapısı ................................................................................................................. 3
2 VERİ MAHREMİYETİ ................................................................................................ 4
2.1 Mahremiyet Koruma Süreci ......................................................................................... 5
2.2 Mahremiyet Problemi................................................................................................... 7
2.3 Mikro Veri Modeli ....................................................................................................... 8
2.4 Mahremiyet Koruma Modelleri ................................................................................... 9
2.4.1 k-Anonimlik ........................................................................................................ 11
2.4.2 ℓ-Çeşitlilik ........................................................................................................... 12
2.4.3 t-Yakınlık ............................................................................................................. 13
2.4.4 δ-Mevcudiyet ....................................................................................................... 16
2.4.5 Diferansiyel Mahremiyet ..................................................................................... 17
2.5 Veri Anonimleştirme .................................................................................................. 18
2.5.1 Genelleştirme ....................................................................................................... 18
2.5.2 Baskılama ............................................................................................................ 23
2.5.3 Anatomi ............................................................................................................... 25
2.5.4 Permütasyon ........................................................................................................ 27
2.5.5 Pertürbasyon ........................................................................................................ 28
2.6 Mahremiyet Tehditleri ............................................................................................... 30
2.6.1 Arka Plan Bilgileri ............................................................................................... 31
2.6.2 Kimlik İfşası ........................................................................................................ 31
vi
2.6.3 Öznitelik İfşası ..................................................................................................... 31
2.6.4 Üyelik İfşası ......................................................................................................... 32
2.6.5 Tehditlere Göre Modeller .................................................................................... 32
2.7 Bilgi Metrikleri .......................................................................................................... 33
2.7.1 Bozulma Metriği .................................................................................................. 33
2.7.2 Yükseklik Metriği ................................................................................................ 33
2.7.3 Duyarlılık Metriği ................................................................................................ 34
2.7.4 Kayıp Metriği ...................................................................................................... 35
2.7.5 Eşlenik Sınıflar Ortalaması .................................................................................. 36
2.7.6 Ayırt Edilebilirlik Metriği ................................................................................... 36
2.7.7 Entropi Metriği .................................................................................................... 37
2.7.8 Sınıflandırma Yöntemi ........................................................................................ 37
2.7.9 Denge Metriği ...................................................................................................... 38
2.7.10 KL-Sapma Metriği (KL-divergence-KLM)......................................................... 38
2.7.11 Kesinlik Ceza Metriği .......................................................................................... 39
2.8 Kimlik İfşa Metrikleri ................................................................................................ 40
2.8.1 Türetilmiş Risk Metrikleri ................................................................................... 40
2.8.2 Basit Risk Metrikleri ........................................................................................... 43
2.8.3 Biriciklik Metriği ................................................................................................. 45
2.9 Bölüm Sonucu ............................................................................................................ 46
3 MATERYAL ve YÖNTEM ........................................................................................ 47
3.1 Hazırlık Katmanı ........................................................................................................ 48
3.1.1 Mahremiyet Araçları............................................................................................ 48
3.1.2 Veri Kümeleri ...................................................................................................... 51
3.1.3 Arama Uzayı ........................................................................................................ 53
3.1.4 Modeller ve Parametreler .................................................................................... 55
3.1.5 Hazırlık Katmanı Algoritması ............................................................................. 55
3.2 Kazanımsal Anonimleştirme Katmanı ....................................................................... 57
3.2.1 Fayda Ölçümü ..................................................................................................... 57
3.2.2 Aykırı Kayıtlar ..................................................................................................... 58
3.2.3 Risk Ölçümü ........................................................................................................ 61
3.2.4 ρ-Kazanım Karar Kuralı ...................................................................................... 62
3.2.5 Kazanımsal Anonimleştirme Katmanı Algoritması ............................................ 63
3.3 Yayınlama Katmanı ................................................................................................... 64
vii
3.4 Bölüm Sonucu ............................................................................................................ 66
4 DENEYSEL ÇALIŞMALAR VE BULGULAR ........................................................ 67
4.1 Öznitelik Sınıflandırma ve Genelleştirme .................................................................. 67
4.1.1 ADULT ................................................................................................................ 67
4.1.2 DEMOGRAFİK .................................................................................................. 73
4.1.3 CUP ..................................................................................................................... 78
4.2 Deneysel Değerlendirmeler ........................................................................................ 80
4.2.1 ρ-Kazanım (k) Deneyi ......................................................................................... 83
4.2.2 ρ-Kazanım (k,ℓ) Deneyi ...................................................................................... 87
4.2.3 ρ-Kazanım (k,t) Deneyi ....................................................................................... 92
4.2.4 ρ-Kazanım (k, ℓ ,t) Deneyi .................................................................................. 97
4.3 Bölüm Sonucu .......................................................................................................... 102
5 SONUÇLAR .............................................................................................................. 103
ÖZGEÇMİŞ ....................................................................................................................... 106
KAYNAKLAR .................................................................................................................. 108 | tr_TR |
dc.language.iso | tur | tr_TR |
dc.publisher | Fen Bilimleri Enstitüsü | tr_TR |
dc.rights | info:eu-repo/semantics/openAccess | tr_TR |
dc.subject | Ρ-Kazanım Modeli | |
dc.subject | Anonimleştirme | |
dc.subject | Aykırı Eşlenik Sınıf | |
dc.subject | Faydalı Eşlenik Sınıf | |
dc.subject | Fayda Temelli Veri Yayınlama | |
dc.subject | Veri Mahremiyeti | |
dc.subject | Veri Faydası | |
dc.title | ρ-Kazanım: Mahremiyet Korumalı Fayda Temelli Veri Yayınlama Modeli | tr_TR |
dc.type | info:eu-repo/semantics/doctoralThesis | tr_TR |
dc.contributor.department | Bilgisayar Mühendisliği | tr_TR |
dc.contributor.authorID | 10155695 | tr_TR |