期刊文献+

面向个体和敏感属性值的匿名数据发布

ANONYMOUS DATA PUBLISHING FROM THE PERSPECTIVE OF INDIVIDUAL AND SENSITIVE ATTRIBUTE VALUES
下载PDF
导出
摘要 针对目前数据发布方法不能有效处理不同个体隐私保护需求的问题,依据个体隐私自治的原则,从面向个体和敏感属性值角度,提出一个敏感数据发布的个性化匿名发布模型和基于泛化技术的启发式算法。通过Adult数据实验,验证了算法的可行性。与Basic Incognito和Mondrian相比,信息损失少,算法性能良好。 While current data publishing methods can not effectively deal with different issues of individual privacy protection needs,this paper,based on the autonomy principle of individual privacy,puts forward a personalised anonymous publishing model applied to release the sensitive data and a generalisation-based heuristic algorithm,both are from the perspective of individual and sensitive attribute values.Finally,the Adult data experiments verify the feasibility of this algorithm.These show that it has less loss of information than the algorithm of Basic Incognito and Mondrian,and has good execution performance.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第6期5-7,75,共4页 Computer Applications and Software
基金 国家自然科学基金项目(61070031)
关键词 数据发布 个性化 泛化 匿名模型 Data publishing Personalisation Generalisation Anonymity model
  • 相关文献

参考文献13

  • 1Latanya Sweeney. k-anonymity : A model for protecting privacy [ J ]. In- ternational Journal of Uncertainty, Fuzziness and Knowlege-Based Sys- tems,2002,10 ( 5 ) :557 - 570.
  • 2Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke. L-diversity: Privacy beyond k-anonymity [ J ]. ACM Transactions on Knowledge Dis- covery from Data ( TKDD ) ,2007,1 ( 1 ) : 3.
  • 3Alina Campan, Traian Marius Truta, Nicholas Cooper. P-sensitive K-an- onymity with generalization constraints [ J ]. Transactions on Data Priva- cy,2010,3 ( 2 ) :65 - 89.
  • 4Sun Xiaoxun, Sun Lili, Wang Hua. Extended k-anonymity models a- gainst sensitive attribute disclosure [ J ]. Computer Communications, 2011,34(4) :526 -535.
  • 5Li Ninghui, Li Tiancheng. Suresh Venkatasubramanian, t-closeness : Pri- vacy beyond k-anonymity and 1-diversity[ C ]//IEEE 23rd International Conference On Data Engineering, Vols 1 - 3,2007 : 81 - 90.
  • 6Raymond Wong Chiwing, Li Jiuyong, Ada Fu Waichee. (ct, k)-ano- nymity an enhanced k-anonymity model for privacy preserving data publishing[ C ]//ACM SIGKDD ,2006:754 - 759.
  • 7韩建民,于娟,虞慧群,贾泂.面向敏感值的个性化隐私保护[J].电子学报,2010,38(7):1723-1728. 被引量:40
  • 8Xiao X, Tao Y. Personalized privacy preservation [ C ]//Prec. of the ACM SIGMOD Conference on Management of Data (SIGMOD) , Atlan- ta, Georgia, USA,2006 : 229 - 240.
  • 9Li Z, Zhan G, Ye X. Towards an Anti-Inference (k, 1)-Anonymity Mod- el with Value Association Rules [ C ]//17th DEXA, September,2006, Poland,2006 : 883 - 93.
  • 10王茜,曾子平.(p,a)-sensitivek-匿名隐私保护模型[J].计算机应用研究,2009,26(6):2177-2179. 被引量:7

二级参考文献23

  • 1SWEENEY L. K-anonymity:a model for protecting privacy [ J]. International Joumal of Uncertainty, Fuzziness and Knowledge-Based Systems,2002,10 (5) :557-570.
  • 2MA CHANA V AJJHALA A, GEHRKE J, KIFER D , et al. L-diversity: privacy beyond k-anonymity [ C ]//Proc of the 22nd International Conference on Data Engineering. New York : ACM Press ,2006:24-35.
  • 3TRAIAN T M,BINDU V. Privacy protection:p-sensitive k-anonymity property[ C]//Proc of the 22nd International Conference on Data Engineering. New York : ACM Press ,2006:94.
  • 4WONG R C, LI Jin-yong, FU A W, et al. ( a, k ) -anonymity : an enhanced k-anonymity model for privacy preserving [ C ]//Proc of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York : ACM Press,2006 : 754-759.
  • 5LWUCHUKWU T, NAUGHTON J. K-anonymization as spatial indexing: toward scalable and incremental anonymization [ C ]//Proc of the 33rd International Conference on Very Large Data Bases. [ S. l. ] : VLDB Endowment,2007:746-757.
  • 6XIAO Xiao-kui, TAO Yu-fei. Anatomy:simple and effective privacy preservation[ C ]//Proc of the 32nd International Conference on Very Large Data Bases. [ S. l ] : VLDB Endowment,2006 : 139-150.
  • 7HETTICH S, BLAKE C L, MERZ C J. UCI repository of machine learning databases [ EB/OL]. ( 1998 ). http://www. ics. uci. edu/-mlearn/MLRepository, html.
  • 8BAYARDO R, AGRAWAL R. Data privacy through optimal k-anonymity[ C ]//Proc of the 21st International Conference on Data Engineering. Washington DC : IEEE Computer Society,2005:217-228.
  • 9LI Ning-hui, LI Tian-cheng, SURESH V. T-closeness: privacy beyond k-anonymity and L-diversity[ C ]//Proc of the 23rd International Conference on Data Engineering. 2007 : 106-115.
  • 10SWEENEY L. Achieving k-anonymity privacy protection using generalization and suppression[ J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002,10 ( 5 ) : 571- 588.

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部