期刊文献+

K-匿名技术在无线传感器网络隐私保护中的应用 被引量:1

The Application of K-anonymity Technology in Wireless Sensor Network Privacy Protection
下载PDF
导出
摘要 无线传感器网络是一种大规模的分布式网络,由于其部署环境的原因和传统的网络相比,其通讯安全存在较大的隐患,尤其是隐私保护问题.本文首先对全局K-匿名算法存在的问题进行了分析,在此基础上,提出了二次k-匿名算法,并进行描述,最后通过实验证明算法的有效性. Wireless Sensor Network is a large-scale distributed network,because of its deployment environment,there is a big security risk of the communication,compare with the traditional networks,especially the privacy issues.In this paper,analysis the problem of global K-anonymity,on this basis,proposed a second k-anonymity algorithm,and described,and finally proved the effectiveness of the algorithm by experiments.
作者 丁媛媛
出处 《内蒙古民族大学学报(自然科学版)》 2011年第6期650-652,共3页 Journal of Inner Mongolia Minzu University:Natural Sciences
关键词 K-匿名 无线传感器网络 K-anonymity Wireless Sensor Network
  • 相关文献

参考文献4

二级参考文献65

  • 1张坤,刘国华.基于熵的视图安全性判定[J].计算机研究与发展,2006,43(z2):122-127. 被引量:4
  • 2陈子阳,郜时红,刘国华.基于k-匿名的视图发布安全问题的研究[J].计算机研究与发展,2006,43(z2):133-139. 被引量:5
  • 3郜时红,刘国华,聂俊岚,钱颖.基于先验知识的视图发布安全问题的研究[J].计算机研究与发展,2006,43(z3):206-211. 被引量:4
  • 4杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 5LIU Guohua GAO Shihong.A Method of Eliminating Information Disclosure in View Publishing[J].Wuhan University Journal of Natural Sciences,2006,11(6):1753-1756. 被引量:4
  • 6Sweeney L. K-Anonymity, A model for protecting privacy [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5): 557-570
  • 7Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression [J]. International Journal of Uncertainty, Fuzziness and Knowledge Based Systems, 2002, 10(5): 571-588
  • 8Sweeney L. Guaranteeing anonymity when sharing medical data: The datafly system [J]. Journal of the American Medical Informatics Association. 1997, 4(Suppl): 51-55
  • 9Hundepool A, Willenborg L. μ-and τ-argus: Software for statistical disclosure control [C]//Proc of the 3rd Int Seminar on Statistical Confidentiality. Ljubliana: Eurostat-Statistical Office of the Republic of Slovenia, 1996:208-217
  • 10Meyerson A, Williams R. On the complexity of optimal k- anonymity [C] //Proc of the ACM Syrup on Principles of Database Systems. New York: ACM, 2004:223-228

共引文献21

同被引文献30

  • 1艾瑞咨询,腾讯电脑管家.2012年个人网络安全年度报告[R].2013.
  • 2Xu H, Teo H H, Tan B C Y, et al. Research Note -Effects of in dividual self- protection, industry self- regulation, and govern ment regulation on privacy concerns: A study oflocation based services[J]. Information Systems Research, 2012, 23(4) : 1342- 1363.
  • 3Phelps J, Nowak G, Ferrell E. Privacy concerns and consumer willingness to providepersonal information[J]. Journal of Public Policy & Marketing, 2000,19(1) :27-41.
  • 4Culnan M J, Bies R J. Consumer privacy: Balancing economic and justiceconsiderations[J]. Journal of social issues, 2003, 59 (2) : 323-342.
  • 5Dinev T, Hart P. Internet privacy concerns and their antecedents -measurement validity and a regression model[J]. Behaviour & Information Technology, 2004, 23(6):413-422.
  • 6Malhotra N K, Kim S S, Agarwal J. Internet users" information privacy coneerns(IUIPC): The construct, the scale, and a causal model[J]. Information Systems Research, 2004, 15(4): 336- 355.
  • 7Hoadley, C. M. , et al. Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry[J]. Electronic Commerce Research & Applications, 2010,9(1) : 50- 60.
  • 8Hong W, Thong J y L. Internet Privacy Concerns: An Integrat- ed Conceptualization andFour Empirical Studies[J]. Management Information Systems Quarterly, 2013, 37(1):275-298.
  • 9Heng, X. , et aL Information Privacy Concerns: Linking Indevid ual Perceptions withlnstitutional Privacy Assurances[J]. Journal of the Association for Information Systems, 2011,12 (12) : 798 - 824.
  • 10Chellappa R K, Sin R G. Personalization versus privacy: An em- pirical examination of the online consumer's dilemma[J],Infor mation Technology and Management, 2005,6(2- 3) : 181 - 202.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部