期刊文献+

半监督聚类的匿名数据发布 被引量:6

Semi-supervised clustering-based anonymous data publishing
下载PDF
导出
摘要 为增强个体与隐私信息的保护力度,提高数据效用和降低时间代价,提出半监督聚类的(α,k)匿名模型,并设计算法予以实现,分析了算法时间复杂度.针对数据集包含数值属性和分类属性的特点,把数值属性和分类属性映射到相同的度量空间进行运算,以相异矩阵表示数据集元组之间的距离,使相同或者相近的元组有效地聚集到同一个簇内.把高敏感度属性设置较高的保护度,低敏感度设置较低的保护度,实现了敏感属性的个性化保护.实验结果表明,半监督(α,k)匿名模型可安全且高效地实现隐私保护,保证了发布数据的质量. To enhance protection efforts of individual and privacy information,as well as to improve data utility and reduce the time cost,an(α,k)-anonymous model based on semi-supervised clustering was proposed,and an algorithm was designed to achieve this model.Moreover,time complexity of the algorithm was analyzed.The data set,containing numeric and category attributes,was mapped to the same metric space.Therefore,the element of the dissimilarity matrix can denote the distance between the tuples,which results in the same or similar tuples gathering to the same cluster.For high sensitivity attributes,a higher degree of protection was set whereas for low sensitive attributes a lower degree of protection was set,achieving personalized protection of sensitive attributes.Experimental results show that the semi-supervised(α,k)-anonymous model can achieve safe and efficient privacy preservation while simultaneously ensuring the quality of publishing data.
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2011年第11期1489-1494,共6页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(61073043 61073041 60873037) 黑龙江省自然科学基金资助项目(F200901)
关键词 数据发布 隐私保护 匿名数据 半监督 聚类 data publishing privacy preserving anonymous data semi-supervised clustering
  • 相关文献

参考文献14

  • 1FUNG B C M, WANG K, CHEN R, et al. Privacy-preserving data publishing : a survey of recent developments [ J ]. ACM Comput Surv, 2010, 42(4) : 1-53.
  • 2CHEN B, KIFER D, LEFEVRE K, et al. Privacy-preserving data Publishing[J]. Found Trends databases, 2309, 2 (1) : 1-167.
  • 3SWEENEY L. k-anonymity: a model for protecting privacy[J]. International Journal of Uncertainty Fuzziness and Knowledge Based Systems, 2002, 10(5) : 557-570.
  • 4AGGARWAL G, PANIGRAHY R. Achieving anonymity via clustering[J]. ACM Trans Algorithms, 2010, 6 (3) : 1-19.
  • 5MACHANAVAJJHALA A, KIFER D, GEHRKE J, et al. l-diversity : privacy beyond k-anonymity [ J ]. ACM Transactions on Knowledge Discovery from Data, 2007, 1 (1) : 1-52.
  • 6WONG R, LI J, FU A, et al. (α, k)-anonymous data publishing[ J ]. Journal of Intelligent Information Systems, 2009, 33(2): 209-234.
  • 7WONG R, LI J, FU A, et al. (α, k)-anonymous data publishing[J]. Journal of Intelligent Information Systems, 2009, 33(2): 209-234.
  • 8CAMPAN A, TRUTA T M, COOPER N. P-sensitive k-anonymity with generalization constraints [ J ]. Transactions on Data Privacy, 2010, 3(2): 65-89.
  • 9MACHANAVAJJHALA A, GEHRKE J, KIFER D, et al. lcliversity: privacy beyond k-anonymity [ C ]//22nd IntemaLional Conference on Data Engineering. Atlanta, GA, US, 2006 : 24.
  • 10王智慧,许俭,汪卫,施伯乐.一种基于聚类的数据匿名方法[J].软件学报,2010,21(4):680-693. 被引量:49

二级参考文献12

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2Samarati P,Sweeney L.Generalizing data to provide anonymity when disclosing information (abstract)[A].Proceedings of the 17th ACM-SIGMOD-SIGACT-SIGART Symposium on the Principles of Database Systems[C].Seattle,WA,USA:IEEE press,1998.188.
  • 3Samarati P.Protecting restondents' identities in microdata release[J].IEEE Transactions on Knowledge and Data Engineering,2001,13(6):1010-1027.
  • 4Tiancheng Li,Ninghui Li.Towards optimal k-anonymization[J].Data and Knowledge Engineering,2008,65(1):22-39.
  • 5Machanavajjhala A,Gehrke J,Kifer D.L-diversity:privacy beyond k-anonymity[A].Proceedings of the 22nd International Confence e on Data Engineering[C].Atlanta,GA,USA:IEEE Press,2006.24-36.
  • 6Truta T M,Vinay B.Privacy protection:p-sensitive kanonymity property[A].Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW)[C].Washington,DC,USA:IEEE Computer Society,2006.94.
  • 7Wong C R,Li J,Fu A,et al.(α,k)-anonymity:an enhanced k-anonymity model for privacy preserving data publishing[A].Proceedings of the 12th ACM SIGKDD Conference[C].Philadelphia,PA:ACM Press,2006.754-759.
  • 8Ninghui Li,Tiancheng Ii,Venkatasubramanian S.t-Closeness:privacy beyond k-anonymity and l-diversity[A].Proceedings of the 23rd International Conference on Data Engineering (ICDE)[C].Istanbul,Turkey:IEEE Press,2007.106-115.
  • 9Xiaokui Xiao,Yufen Tao.Personalized privacy preservation[A].Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data[C].Chicago,Illinois,USA:ACM Press,2006.229-240.
  • 10Zude Li,Guoqiang Zhan,Xiaojun Ye.Towards an anti-inference (k,l)-anonymity model with value association rules[A].Database and Expert Systems Applications (DEXA)[C].Krakow,Poland:Springer-Verlag,Berlin Heidelberg,2006.883-893.

共引文献77

同被引文献45

  • 1FUNG B C M, WANG K, CHEN R,et al. Privacy-preser-ving data publishing: a survey of recent developments[ J].ACM Comput Surv, 2010,42(4) : 1-53.
  • 2MACHANAVAJJHALA A,KIFER D,GEHRKE J, et al.L-diversity : privacy beyond k-anonymity [ J ]. ACM Trans-actions on Knowledge Discovery from Data,2007,1(1):1-52.
  • 3WONG R, LI J, FU A,et al. ( a,k)~ anonymous data pub-lishing [J ] ? Journal of Intelligent Information Systems,2009,33(2) : 209-234.
  • 4PARAMESWARAN R,BLOUGH D M. Privacy preservingdata obfuscation for inherently clustered data[ J]. Journal ofInformation and Computer Security, 2008 , 2(1) : 1744-1765.
  • 5MUKHERJEE S,CHEN Z Y,GANGOPADHYAY A. Aprivacy-preserving technique for Euclidean distance-basedmining algorithms using Fourier-related transforms [ J ].Journal on Very Large Data Bases, 2006, 15(4) : 293-315.
  • 6FUNGB C M, WANG K,WANG L Y, et al. Privacy-pre-serving data publishing for cluster analysis [ J ]. Data &Knowledge Engineering, 2009,68(6) :552-575.
  • 7OLIVEIRA S R M, ZAIANE 0 R. Achieving privacy pres-ervation when sharing data for clustering [ C ]// Proceed-ings of the 2004 SDM Conference. Toronto, Canada, 2004:67-82.
  • 8RUPA P,DOUGLAS M B. Privacy preserving data obfus-cation for inherently clustered data [ J ]. International Jour-nal of Information and Computer Security,2008,2(1):1744-1765.
  • 9于戈;李芳芳.物联网中的数据管理[J]{H}中国计算机学会通讯,2010(04):30-34.
  • 10丁治明.物联网对软件技术的挑战及其对策[J]{H}中国计算机学会通讯,2011(01):49-50.

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部