期刊文献+

隐私保护中K-匿名模型的综述 被引量:18

Survey of K-anonymity research on privacy preservation
下载PDF
导出
摘要 K-匿名是近年来隐私保护研究的热点,介绍了K-匿名、K-最小匿名化的基本概念,阐述了泛化与隐匿技术,总结了K-匿名的评估标准,并分析了现有的K-匿名算法。最后对该领域的发展方向作了展望。 K-anonymity is a highlighted topic of privacy preservation research in recent years.In this paper,the concepts of K- anonymity and K-Minimal anonymity are described.Then,generalization & suppression,K-anonymity evaluation criterion,and many different algorithms proposed previously are presented.Finally,the future directions in this field are discussed.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第4期130-134,共5页 Computer Engineering and Applications
关键词 K-匿名 隐私保护 泛化和隐匿 数据挖掘 评估 K-anonymity privacy preservation generalization & suppression data mining evaluation
  • 相关文献

参考文献21

  • 1Aggarwal C.On k-anonymity and the curse of dimensionality[C].Proc of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, 2005 : 901-909.
  • 2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 3Du Wenliang,Attalah M J.Secure multi-problem computation problems and their applications:A review and open problems,CERIAS Tech Report 2001-51[R].Center for Education and Research in Information Assurance and Security and Department of Computer Sciences,Purdue University,West Lafayette,IN 47906,2001,
  • 4Bettini C,Wang X S,Jajodia S.Protecting privacy against location based personal identification[C].Proc of the Secure Data Management,Trondheim, Norway, 2005 : 185-199.
  • 5Domingo-Ferrer J,Mateo-Sanz J M.Practical data-oriented microaggregation for statistical disclosure control[C].IEEE Transactions on Knowledge and Data Engineering, 2002:189-201.
  • 6Kargupta H,Datta S,Wang Qi,et al,On the privacy preserving properties of random data perturbation techniques[C].Proc of ICDM' 03, Washington, DC, USA, IEEE Computer Society, 2003 : 99.
  • 7Jiang W,Clifton C,Privacy-preserving distributed k-anonymity[C].Proc of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security,Storrs, CT,USA,2005.
  • 8Wang Ke,Yu P,Chakraborty S.Bottom-up generalization:a data mining solution to privacy protection[C].Proc of the 4th International Conference on Data Mining,Brighton,UK, 2004:249-256.
  • 9Sweeney L.Achieving k-anonymity privacy protection using generalization and suppression[J].Intemational Journal on Uncertainty, Fuzziness and Knowledge-based Systems,2002:571-588.
  • 10Sweeney L.k-Anonymity:a model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10(7) : 557-570.

二级参考文献10

  • 1Sweeney L.K-Anonymity:A model for protecting privacy.Int'l Journal on Uncertainty,Fuzziness and Knowledge Based Systems,2002,10(5):557-570.
  • 2Liu XY,Yang XC,Yu G.A representative classes based privacy preserving data publishing approach with high precision.Computer Science,2005,32(9A):368-373 (in English with Chinese abstract).
  • 3Meyerson A,Williams R.On the complexity of optimal k-anonymity.In:Deutsch A,ed.Proc.of the 23rd ACM SIGACT-SIGMOD-SIGART Symp.on Principles of Database Systems (PODS 2004).New York:ACM,2004.223-228.
  • 4Aggarwal G,Feder T,Kenthapadi K,Motwani R,Panigrahy R,Thomas D,Zhu A.Anonymizingtables.In:Eiter T,Libkin L,eds.Proc.of the 10th Int'l Conf.on Database Theory (ICDT 2005) LNCS 3363,Springer-Verlag,2005.246-258.
  • 5Iyengar V.Transforming data to satisfy privacy constraints.In:Zaiane O,ed.Proc.of the 8th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2002).New York:ACM,2002.279-288.
  • 6Yao C,Wang XS,Jajodia S.Checking fork-anonymity violation by views.In:Bohm K,Jensen CS,Hass LM,Kersten ML,Larson P,Ooi BC,eds.Proc.of the 31st Int'l Conf.on Very Large Data Bases (VLDB 2005).Trondheim:ACM,2005.910-921.
  • 7Sweeney L.Guaranteeing anonymity when sharing medical data,the Datafly system.In:Masys DR,ed.Proc.of the 1997American Medical Informatics Association Annual Fall Symp (AMIA'97).1997.51-55.http://www.amia.org/pubs/symposia/D004462.pdf
  • 8LeFevre K,DeWitt D,Ramakrishnan R.Incognito:Efficient full-domain k-anonymity.In:Ozcan F,ed.Proc.of the ACM SIGMOD Int'l Conf.on Management of Data.New York:ACM,2005.49-60.
  • 9Fung B,Wang K,Yu P.Top-Down specialization for information and privacy preservation.In:Toyama M,Sasaki S,eds.Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Tokyo:IEEE Computer Society,2005.205-216.
  • 10Sweeney L.Achieving k-anonymity privacy protection using generalization and suppression.Int'l Journal on Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):571-588.

共引文献59

同被引文献184

引证文献18

二级引证文献80

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部