메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학위논문
저자정보

조준규 (연세대학교, 연세대학교 일반대학원)

지도교수
이원석
발행연도
2023
저작권
연세대학교 논문은 저작권에 의해 보호받습니다.

이용수2

표지
AI에게 요청하기
추천
검색

이 논문의 연구 히스토리 (2)

초록· 키워드

오류제보하기
트랜잭션 데이터베이스는 일반적인 데이터베이스와는 달리 사전에 정의된 형식과 구조가 없이 항목의 집의 형태를 가진다. 이러한 성질의 트랜잭션 데이터베이스는 오늘날 개인의 물품 구매 내역, 인터넷 사용 기록, 차량 또는 개인의 이동 경로, 각종 센서를 비롯한 IoT 장치 등을 통해 실시간으로 엄청난 양의 데이터가 우리의 일상생활 속에서 발생하고 있다. 기업과 연구소는 트랜잭션 데이터베이스를 활용하여 데이터 마이닝, 머신러닝 등을 통해 개인 또는 집단의 행동 성향을 분석하고 상품 마케팅 등에 사용하고 있다. 하지만 이러한 트랜잭션 데이터베이스는 개인의 생활 정보와 특정 패턴과 같이 민감한 개인정보를 포함할 수 있어 외부로 공개 또는 유출되었을 때 항목의 조합을 통해 특정 개인이 재식별되는 심각한 개인정보유출 사고가 발생할 수 있다.
본 연구는 개인중복수를 통한 빈발 항목집합과 트랜잭션 데이터베이스에서 나타난 항목을 상위 항목으로 변환하는 일반화를 사용하여 트랜잭션 데이터베이스에서 재식별이 발생하지 않는 트랜잭션 데이터베이스 익명 처리 방법에 대하여 설명하고, 익명 또는 비식별 처리된 트랜잭션 데이터베이스의 익명성 검증과 유용성을 검증하기 위하여 원본 트랜잭션 데이터베이스와 통계적 유사도를 측정하였다.

목차

그림 차례 ··························································································································4
표 차례 ······························································································································5
국문 요약 ··························································································································6
제1장 서론 ························································································································7
1.1 연구의 배경 및 목적 ····························································································7
1.2 논문의 구성 ············································································································9
제2장 관련 연구 ············································································································10
제3장 익명 트랜잭션 데이터베이스 생성 ································································14
3.1 빈발 항목집합 탐색 ····························································································14
3.2 항목 일반화 ··········································································································16
3.3 P-중복성 기반 익명 트랜잭션 생성 ································································17
제4장 익명성 검증 지표 ······························································································22
제5장 유용성 검증 지표 ······························································································23
제6장 실험 평가 ············································································································26
6.1 재식별도 측정 ······································································································28
6.2 원본유사도 측정 ··································································································31
6.3 항목 잔존율 측정 ································································································34
제7장 결론 ······················································································································37
참고 문헌 ························································································································38
영문 요약 ························································································································40

최근 본 자료

전체보기

댓글(0)

0