期刊文献+

基于聚类的敏感属性-多样性匿名化算法 被引量:6

Clustering-based sensitive attribute -diversity anonymization algorithms
下载PDF
导出
摘要 提出了基于聚类的敏感属性-多样性匿名化算法,该算法生成的每个聚类至少有个不同的敏感属性值,每个聚类的大小介于和2-1之间,以达到最优划分并提高数据的安全性。同时,该算法生成聚类候选记录集以减少不必要的计算和比较,生成聚类时总是选择与聚类质心信息损失最小的记录,提高了算法效率并减少信息的损失。实验结果表明,该算法是高效的,且生成的匿名数据集具有较高的可用性。 Two clustering-based sensitive attribute-diversity anonymization algorithms are presented.The algorithms generate the clusters which have at least distinct values of sensitive attributes.The size of each cluster is between and 2-1 to achieve the optimal partition and to improve the security of the data.The algorithms also generate the candidate tuples to reduce the unnecessary computation and the comparison operations,and always select the tuple that has minimal information loss to cluster centroid to generate the clusters,and improve the algorithm efficiency and reduce the information loss.The experimental results show that the presented algorithms are efficient and the generated anonymity table has high utility.
作者 滕金芳 钟诚
出处 《计算机工程与设计》 CSCD 北大核心 2010年第20期4378-4381,共4页 Computer Engineering and Design
基金 广西科学基金项目(桂科基0728033) 广西高校人才小高地建设创新团队资助计划基金项目(桂教人[2007]71号)
关键词 隐私泄露 匿名化 -多样性 敏感属性 聚类 privacy disclosure anonymization -diversity sensitive attribute clustering
  • 相关文献

参考文献9

  • 1Sweeney L.K-anonymity:A model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledgebased Systems,2002,10(5):557-570.
  • 2Machanavajjhala A,Gehrke J,Kifer D.L-diversity:Privacy beyond k-anonymity[C].Proc of the 22nd IEEE International Conference on Data Engineering.Atlanta,GA,USA:IEEE Press,2006:24-36.
  • 3Li Jiuyong,Raymond Chi-Wing Wong,Ada Wai-Chee Fu,et al.Achieving k-anonymity by clustering in attribute hierarchical structures[C].Proc of the 8th International Conference on Data Warehousing and Knowledge Discovery,2006:405-416.
  • 4Ercan Nergiz M,Chris Clifton.Thoughts on k-anonymization[J].Data and Knowledge Engineering,2007,63(3):622-645.
  • 5Domingo-Ferrer J,Mateo-Sanz J M.Efficient multivariate dataoriented microaggregation[J].VLDB Journal,2006,15:355-369.
  • 6Solanas A,Martinez-Baslleste A,Domingo-Ferrer J.V-MDAV:A multivariate microaggregation with variable group size[C].Proc of Computational Statistics.Rome,Italy:Springer-Verlag,2006:917-927.
  • 7Loukides G,Shao J.Capturing data usefulness and privacy protection in k-anonymisation[C].Seoul,Korea:Proc of the 22nd Annual ACM Symposium on Applied Computing,2007:370-374.
  • 8Ji-Won Byon,Ashish Kamra,Elisa Bertino,et al.Efficient k-ano-nymity using clustering technique[R].West Lafayette,Indiana,USA:Purdue University,West Lafayette,2006.
  • 9Bayardo R J,Agrawal R.Data privacy through optimal k-anony-mization[C].Tokyo,Japan:Proc of the 21 st International Conference on Data Engineering,2005:217-228.

同被引文献45

  • 1Sweeney L. Computational disclosure control:A primer on data privacy pmtection[ D ]. Massachusetts Institute of Technology, 2001.67 - 82.
  • 2Sweeney L. k-anonymity: A model for protecting privacy[ J ]. International Journal on Uncertainty, Fuzziness and Knowledge Based Systems,2002,10(5) :557 - 570.
  • 3Machanavajjhala A, Kifer D, Gehrke J, et al./-diversity: Priva- cy beyond k-anonymity[ J]. ACM Transactions on Knowledge Discovery from Data, 2007,1 (1) : 1 - 52.
  • 4Li J Y,Wong R C W,et al. Achieving k-anonymity by cluster- ing in attribute hierarchical structmres[ A ]. Proceedings of the 8th International Conference on Data Warehousing and Knowl- edge Discoveryl C ]. Krakow, Poland, Springer Press, 2006.405 - 416.
  • 5Aggarwal G,Panigrahy R,et al. Achieving anonymity via clus-tering[ J]. ACM Trans Algorithms, 2010,6(3) : 1 - 19.
  • 6Xiao X K, Tao Y F. Personalized privacy preservation[ A]. Proceedings of the 2006 ACM SIGMOD International Confer- ence on Management of Data[ C] .New York,NY, USA:ACM Press, 2006.229 - 240.
  • 7Ye X J, Zhang Y W, et al. A personalized ( a, k)-anonymity model[ A]. Proceedings of the 9th International Conference on Web-Age Information Management (WAIM' 08) [ C ]. Zb.angii- ajie, China: IEEE Press,2008.341 - 348.
  • 8Shen Y G,Liu Y H, et al. Personalized granular k-anonymity [ A]. Proceedings of International Conference on Information Engineering and Computer Science ( ICIECS ' 09 ) [ C ]. Wuhan, China: lEvEE. Press,2009.1-4.
  • 9Wang P S. Personalized anonymity algorithm using clustering techniques[ J]. Journal of Computational Information Systems, 2011,7(3) :924 - 931.
  • 10Bayardo R J, Agrawal R. Data privacy through optimal k- anonymization[ A]. In Proceedings of the 21st IEEE Interna- tional Conference on Data Engineering [ C ]. Tokyo, Japan: IV, IEEE. Press, 2005.217 - 228.

引证文献6

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部