期刊文献+

基于R树多维K-匿名算法 被引量:4

Algorithm for Multidimensional K-anonymity by R Tree
下载PDF
导出
摘要 K-匿名是微数据发布隐私保护的一种重要方法。针对适应动态数据、实时相应等特征需求,提出基于R树的多维数据K匿名解决方案,包括对原有R树结构的改造方法及其相应的K-匿名化过程。基于Adult数据库,通过实验验证了本模型能够保证K匿名属性的正确性,同时由于分裂算法的影响,也能保证信息保存的完整性。 K-anonymization is an important approach to protect data privacy in data publishing scenario. Like K-D tree for multidimensional K- anonymity, this paper proposes, an implementation of R tree in which each record is considered as a point in d-dimensional space of the attribute. Instead of dividing the region into pieces, the nearby rectangles are grouped into parent minimal bounding rectangles and forms disk blocks. Experiment results by modifying several parameters show that the algorithm can handle higher dimensionality compared with grid file or k-d tree.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第1期80-82,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60673140)
关键词 数据隐私 K-匿名 多维 R树 data privacy K-anonymization multidimensional R-tree
  • 相关文献

参考文献6

  • 1Iyengar V.Transforming Data to Satisfy Privacy Constraints[C]//Proc.of the ACM SIGKDD.USA:[s.n.],2002:279-287.
  • 2Willenborg L,DeWaal T.Elements of Statistical Disclosure Control[M].NT:Springer Verlag,2000.
  • 3Sweeney L.Achieving K-anonymity Privacy Protection Using Generalization snd Suppression[J].Journal on Uncertainty,Fuzziness,and Knowledge-based Systems,2002,10(5):571-588.
  • 4LeFevre K,DeWitt D,Ramakrishnan R.Mondrian Multidimensional K-anonymity[C]//Proc.of the 22nd International Symposium on Data Engineering.USA:[s.n.],2006
  • 5Guttman A R.R-trees:A Dynamic Index Structure for Spatial Searching[C]//Proc.of ACM SIGMOD.USA:[s.n.],1984:47-57.
  • 6Blake C,Merz C.UCI Repository of Machine Learning Databases[EB/OL].(1998-11-15).http://www.ics.uci.edu/-mlearn/M1-Repository.html..

同被引文献21

  • 1王一蕾,吴英杰,唐庆明.基于混合划分技术的隐私保护关系型数据发布算法[J].南京理工大学学报,2013,37(4):493-499. 被引量:2
  • 2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 3徐红云,江丽,彭曙光,张涛.匿名系统中统计分析攻击及防御策略研究[J].湖南大学学报(自然科学版),2007,34(7):73-77. 被引量:1
  • 4Sweeney L. K-anonymity: a model for protecting privacy[J]. International Journal of Uncer*.ainty, Fuzziness and Knowledge-based Systems, 2002, 10(5): 557-570.
  • 5Sweeney L. Computational Disclosure Control: A primer on data privacy protection. [Ph.D. Thesis, Massachusetts Institute of Technology], 2001:67-82.
  • 6Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression [J]. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10(5):571-588.
  • 7Liu XY, Yang XC, Yu G. A representative class based privacy preserving data publishing approach with high precision[J]. Computer Science, 2005,32(9A):3687373.
  • 8LeFevre K, DeWitt D, Ramakrishnan R. Incognito: Efficient Full-domain k-anonymity [Z]. In Proc. Of the ACM SIGMOD Int'l Conf on Management of Data, Baltimore, Maryland, USA, 2005:49-60.
  • 9LeFevre K, DeWitt D, Ramakrishnan R. Mondrian multidimensional K-anonymity [C]. Proc of 22nd ICDE. Los Alamitos, USA: IEEE Computer Society Press, 2006: 25-34.
  • 10Le Fever K,De Witt D J,Ramakrishnan R.Mondrian multidimen-sional k-anonymity[A].Proc of the International Conference on Data Engineering(ICDE'06)[C].Atlanta:Institute of Electrical and Electronic Engineers Computer Society,2006.84-96.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部