期刊文献+

Medical data publishing based on average distribution and clustering 被引量:3

下载PDF
导出
摘要 Most of the data publishing methods have not considered sensitivity protection,and hence the adversary can disclose privacy by sensitivity attack.Faced with this problem,this paper presents a medical data publishing method based on sensitivity determination.To protect the sensitivity,the sensitivity of disease information is determined by semantics.To seek the trade-off between information utility and privacy security,the new method focusses on the protection of sensitive values with high sensitivity and assigns the highly sensitive disease information to groups as evenly as possible.The experiments are conducted on two real-world datasets,of which the records include various attributes of patients.To measure sensitivity protection,the authors define a metric,which can evaluate the degree of sensitivity disclosure.Besides,additional information loss and discernability metrics are used to measure the availability of released tables.The experimental results indicate that the new method can provide better privacy than the traditional one while the information utility is guaranteed.Besides value protection,the proposed method can provide sensitivity protection and available releasing for medical data.
出处 《CAAI Transactions on Intelligence Technology》 SCIE EI 2022年第3期381-394,共14页 智能技术学报(英文)
基金 supported by the National Natural Science Foundation of China(No.62062016) Doctoral research start‐up fund of Guangxi Normal University(RZ1900006676) Guangxi project of improving Middleaged/Young teachers'ability(No.2020KY020323)。
  • 相关文献

参考文献6

二级参考文献22

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2Lwuchukwu T, Naughton J. K-anonymization as spatial indexing: Toward sealable and incremental anonymization// Proceedings of the 33rd International Conference on Very Large Data Bases. Vienna, Austria, 2007:746-757
  • 3Wong R, Fu A, Wang D, Pei J. Minimality attack in privacy preserving data publishing//Proceedings of the 33rd International Conference on Very Large Data Bases. Vienna, Aus tria, 2007: 543-554
  • 4Sweeney L. K anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowl edge-Based Systems, 2002, 10(5): 557-570
  • 5Samarati P, Sweeney L. Generalizing data to provide anonymity when disclosing information//Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. Seattle, Washington, 1998: 188
  • 6Xiao X, Tao Y. Anatomy: Simple and effective privacy preservation//Proceedings of the 32nd International Conference on Very Large Data Bases. Seoul, Korea, 2006:139-150
  • 7Machanavajjhala A, Gehrke J, and Kefer D. l-diversity: Privacy beyond κ -anonymity//Proceedings of the 22nd International Conference on Data Engineering. Atlanta, Georgia,2006:24
  • 8Bayardo R, Agrawal R. Data privacy through optimal κ-anonymization//Proccedings of the 21st International Conference on Data Engineering. Tokyo, Japan, 2005:217-228
  • 9LeFevre K, DeWitt D, Ramakrishnan R. Incognito: Efficient full-domain κ-anonymity//Proceedings of the ACM SIGMOD International Conference on Management of Data. Baltimore, Maryland, 2005:49-60
  • 10Meyerson A, Williams R. On the complexity of optimal κ-anonymity//Proceedings of the 23rd ACM SIGACT SIG- MOD-SIGART Symposium on Principles of Database Systems. Paris, France 2004: 223-228

共引文献74

同被引文献9

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部