Basit öğe kaydını göster

dc.contributor.advisorAydos, Murat
dc.contributor.authorVural, Yılmaz
dc.date.accessioned2018-10-11T06:57:20Z
dc.date.available2018-10-11T06:57:20Z
dc.date.issued2017-06-23
dc.date.submitted2017-06-23
dc.identifier.urihttp://hdl.handle.net/11655/5240
dc.description.abstractData privacy is a difficult problem that tries to find the best balance between the privacy risks of data owners and the utility of data sharing to the third parties. Anonymization is the most commonly applied technique to overcome data privacy problems. The equivalence classes, the natural outcome of anonymization process, are classified according to the data utility in two main categories: Utility and Outlier Equivalence Classes (UEC, OEC). The utility equivalence class contains records that have been suppressed by anonymization techniques for privacy concerns. Meanwhile, the outlier equivalence class contains records that have been fully suppressed by anonymization techniques resulting in no data utility. In this study, ρ-Gain model, which focus on the effect of outlier equivalence class for increasing data utility, was proposed. In the proposed model, k-Anonymity, ℓ-Diversity and t-Closeness privacy models were used together with ρ-iterations to reduce the privacy risks. The Average Equivalence Class metric was used to measure data utility. According to the findings obtained from the study, the ρ-Gain model improved the data utility, but did not cause a significant negative impact on privacy risk estimates. With the use of the proposed ρ-Gain model as an anonymization technique, we have shown that the data utility has improved while keeping the data privacy risk with no significant change.tr_TR
dc.description.tableofcontentsİÇİNDEKİLER Sayfa ÖZET ...................................................................................................................................... i ABSTRACT ......................................................................................................................... iii TEŞEKKÜR ......................................................................................................................... iv İÇİNDEKİLER ...................................................................................................................... v ÇİZELGELER LİSTESİ .................................................................................................... viii ŞEKİLLER LİSTESİ ............................................................................................................. x SİMGELER VE KISALTMALAR .................................................................................... xiii 1 GENEL BİLGİLER ....................................................................................................... 1 1.1 Mevcut Problem ........................................................................................................... 1 1.2 Tezin Amaç ve Hedefleri ............................................................................................. 2 1.3 Tezin Kapsamı ............................................................................................................. 2 1.4 Tezin Yapısı ................................................................................................................. 3 2 VERİ MAHREMİYETİ ................................................................................................ 4 2.1 Mahremiyet Koruma Süreci ......................................................................................... 5 2.2 Mahremiyet Problemi................................................................................................... 7 2.3 Mikro Veri Modeli ....................................................................................................... 8 2.4 Mahremiyet Koruma Modelleri ................................................................................... 9 2.4.1 k-Anonimlik ........................................................................................................ 11 2.4.2 ℓ-Çeşitlilik ........................................................................................................... 12 2.4.3 t-Yakınlık ............................................................................................................. 13 2.4.4 δ-Mevcudiyet ....................................................................................................... 16 2.4.5 Diferansiyel Mahremiyet ..................................................................................... 17 2.5 Veri Anonimleştirme .................................................................................................. 18 2.5.1 Genelleştirme ....................................................................................................... 18 2.5.2 Baskılama ............................................................................................................ 23 2.5.3 Anatomi ............................................................................................................... 25 2.5.4 Permütasyon ........................................................................................................ 27 2.5.5 Pertürbasyon ........................................................................................................ 28 2.6 Mahremiyet Tehditleri ............................................................................................... 30 2.6.1 Arka Plan Bilgileri ............................................................................................... 31 2.6.2 Kimlik İfşası ........................................................................................................ 31 vi 2.6.3 Öznitelik İfşası ..................................................................................................... 31 2.6.4 Üyelik İfşası ......................................................................................................... 32 2.6.5 Tehditlere Göre Modeller .................................................................................... 32 2.7 Bilgi Metrikleri .......................................................................................................... 33 2.7.1 Bozulma Metriği .................................................................................................. 33 2.7.2 Yükseklik Metriği ................................................................................................ 33 2.7.3 Duyarlılık Metriği ................................................................................................ 34 2.7.4 Kayıp Metriği ...................................................................................................... 35 2.7.5 Eşlenik Sınıflar Ortalaması .................................................................................. 36 2.7.6 Ayırt Edilebilirlik Metriği ................................................................................... 36 2.7.7 Entropi Metriği .................................................................................................... 37 2.7.8 Sınıflandırma Yöntemi ........................................................................................ 37 2.7.9 Denge Metriği ...................................................................................................... 38 2.7.10 KL-Sapma Metriği (KL-divergence-KLM)......................................................... 38 2.7.11 Kesinlik Ceza Metriği .......................................................................................... 39 2.8 Kimlik İfşa Metrikleri ................................................................................................ 40 2.8.1 Türetilmiş Risk Metrikleri ................................................................................... 40 2.8.2 Basit Risk Metrikleri ........................................................................................... 43 2.8.3 Biriciklik Metriği ................................................................................................. 45 2.9 Bölüm Sonucu ............................................................................................................ 46 3 MATERYAL ve YÖNTEM ........................................................................................ 47 3.1 Hazırlık Katmanı ........................................................................................................ 48 3.1.1 Mahremiyet Araçları............................................................................................ 48 3.1.2 Veri Kümeleri ...................................................................................................... 51 3.1.3 Arama Uzayı ........................................................................................................ 53 3.1.4 Modeller ve Parametreler .................................................................................... 55 3.1.5 Hazırlık Katmanı Algoritması ............................................................................. 55 3.2 Kazanımsal Anonimleştirme Katmanı ....................................................................... 57 3.2.1 Fayda Ölçümü ..................................................................................................... 57 3.2.2 Aykırı Kayıtlar ..................................................................................................... 58 3.2.3 Risk Ölçümü ........................................................................................................ 61 3.2.4 ρ-Kazanım Karar Kuralı ...................................................................................... 62 3.2.5 Kazanımsal Anonimleştirme Katmanı Algoritması ............................................ 63 3.3 Yayınlama Katmanı ................................................................................................... 64 vii 3.4 Bölüm Sonucu ............................................................................................................ 66 4 DENEYSEL ÇALIŞMALAR VE BULGULAR ........................................................ 67 4.1 Öznitelik Sınıflandırma ve Genelleştirme .................................................................. 67 4.1.1 ADULT ................................................................................................................ 67 4.1.2 DEMOGRAFİK .................................................................................................. 73 4.1.3 CUP ..................................................................................................................... 78 4.2 Deneysel Değerlendirmeler ........................................................................................ 80 4.2.1 ρ-Kazanım (k) Deneyi ......................................................................................... 83 4.2.2 ρ-Kazanım (k,ℓ) Deneyi ...................................................................................... 87 4.2.3 ρ-Kazanım (k,t) Deneyi ....................................................................................... 92 4.2.4 ρ-Kazanım (k, ℓ ,t) Deneyi .................................................................................. 97 4.3 Bölüm Sonucu .......................................................................................................... 102 5 SONUÇLAR .............................................................................................................. 103 ÖZGEÇMİŞ ....................................................................................................................... 106 KAYNAKLAR .................................................................................................................. 108tr_TR
dc.language.isoturtr_TR
dc.publisherFen Bilimleri Enstitüsütr_TR
dc.rightsinfo:eu-repo/semantics/openAccesstr_TR
dc.subjectΡ-Kazanım Modeli
dc.subjectAnonimleştirme
dc.subjectAykırı Eşlenik Sınıf
dc.subjectFaydalı Eşlenik Sınıf
dc.subjectFayda Temelli Veri Yayınlama
dc.subjectVeri Mahremiyeti
dc.subjectVeri Faydası
dc.titleρ-Kazanım: Mahremiyet Korumalı Fayda Temelli Veri Yayınlama Modelitr_TR
dc.typeinfo:eu-repo/semantics/doctoralThesistr_TR
dc.contributor.departmentBilgisayar Mühendisliğitr_TR
dc.contributor.authorID10155695tr_TR


Bu öğenin dosyaları:

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster