期刊文献+

基于条件函数依赖的隐私保护模型 被引量:1

Privacy-preserving model on data with conditional functional dependency
下载PDF
导出
摘要 数据拥有者发布的数据中如果包含条件函数依赖会导致数据的隐私受到攻击,由条件函数依赖产生的属性间的关联会带来潜在的隐私泄露问题。针对现有的隐私保护方法均无法保护包含条件函数依赖的数据的隐私,形式化地定义了基于条件函数依赖的隐私攻击,提出了隐私保护模型l-deduction来对包含条件函数依赖的数据进行隐私保护;并设计了相应的匿名算法来实现l-deduction模型。理论分析和实验结果表明,该方法既能保护包含条件函数依赖的数据的隐私,又具有较小的信息损失度。 There exists privacy threat in the publishing data that contains CFDs.This paper showed that the correlations among attributes by CFDs could bring potential vulnerability to privacy.This paper formalized the CFD-based privacy attack,proposed the privacy model l-deduction and developed an algorithm that achieved l-deduction.Beyond a theoretical treatment of the problem,the experiments also demonstrate the effectiveness of the proposed technique.
作者 陈伟鹤 陈霖
出处 《计算机应用研究》 CSCD 北大核心 2012年第10期3838-3841,共4页 Application Research of Computers
基金 江苏省教育厅自然科学基金资助项目(09KJB520003) 江苏大学高级人才启动基金资助项目(07JDG031)
关键词 隐私保护 数据发布 条件函数依赖 l-deduction 信息损失 privacy-preserving data publishing conditional functional dependency(CFDs) l-deduction information loss
  • 相关文献

参考文献14

  • 1YUAN Y ong-bin , YANG Jing, ZHANG Jian-pei , et al. Evolution of privacy-preserving data publishing [ C J / /Proc of International Conference on Anti-Counterfeiting, Security and Identification. 2011 : 34- 37.
  • 2SWEENEY L. k-anonymity:a model for protecting privacy [JJ. International Journal on Uncertainty, Fuzziness and Knowledgebased systems.zooz , 10(5) :557-570.
  • 3MACHANA V AJJHALA A, GEHRKE J, KIFER D, et al. I-diversity: privacy beyond k-anonymity [ C J / /Proc of the 22nd International Conference on Data Engineering. New York:ACM Press,2oo6:24-35.
  • 4SHABTAI A, ELOVICI Y, ROKACH L. A survey of data leakage detection and prevention solution [MJ. New York: Spinger ,2012 :47- 68.
  • 5LI Ning-hui, LI Tian-cheng. z-cioseness , privacy beyond k-anonymity and l-diversity[ C J/ /Proc of the 23rd International Conference on Data Engineering. 2007: 106-115.
  • 6WONG R C W, LI Jiu-yong , FU A W, et al. (0<, k) -anonymity: an enhanced k-anonymity model for privacy-preserving data publishing [C J /IProc of the 12th ACM International Conference on Special Interest Group on Knowledge Discovery and Data Mining. New York: ACM Press ,2006: 754-759.
  • 7MARTIN D J, KIFER D, MACHANAVAJJHALA A,etal. Worst-case background knowledge for privacy-preserving data publishing [ C J 1/ Proc of the 23rd International Conference on Data Engineering. New York:ACM Press,2oo7:126-135.
  • 8RASTOGI V, SUCIU D, HONG S. The boundary between privacy and utility in data publishing] CJIIProc of the 33rd International Conference on Very Large Data Bases. [S. 1. J : VLDB Endowment, 2007 : 531-542.
  • 9KIFER D. Attacks on privacy and definetti s theorem [ CJI/Proc of ACM SIGMOD International Conference on Management of Data. New York:ACM Press,2009:127-138.
  • 10WANG Hui, LIU Rui-lin. Privacy-preserving publishing data with full functional dependencies [ C JI/Proc of the 15th International Conference on Database Systems for Advanced Applications. Berlin: Springer-Verlag,2010: 176-183.

二级参考文献73

共引文献219

同被引文献18

  • 1金连,王宏志,黄沈滨,高宏.基于Map-Reduce的大数据缺失值填充算法[J].计算机研究与发展,2013,50(S1):312-321. 被引量:18
  • 2Bohannon P,Fan Wenfei,Geerts F,et al.Conditional functional dependencies for data cleaning[C]//Proc of IEEE ICDE.Piscataway,NJ:IEEE Press,2007:746-755.
  • 3Bravo L,Fan Wenfei,Ma Shuai.Extending dependencies with conditions[C]//Proc of the 33rd International Conference on Very Large Databases.San Francisco,CA:Morgan Kaufmann,2007:243-254.
  • 4Bravo L,Fan Wenfei,Geerts F,et al.Increasing the expressivity of conditional functional dependencies without extra complexity[C]//Proc of IEEE ICDE.Piscataway,NJ:IEEE Press,2008:516-525.
  • 5Fan Wenfei,Ma Shuai,Hu Yanli,et al.Propagating functional dependencies with conditions[J].Proceedings of the VLDB Endowment,2008,1(1):391-407.
  • 6Fan Wenfei.Dependencies revisited for improving data quality[C]//Proc of the 27th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems.New York:ACM Press,2008:159-170.
  • 7Golab L,Karloff H,Korn F,et al.Sequential dependencies[J].Proceedings of the VLDB Endowment,2009,2(1):574-585.
  • 8Koudas N,Saha A,Srivastava D,et al.Metric functional dependencies[C]//Proc of IEEE ICDE.Piscataway,NJ:IEEE Press,2009:1275-1278.
  • 9Chiang F,Miller R J.Discovering data quality rules[J].Proceedings of the VLDB Endowment,2008,1(1):1166-1177.
  • 10Fan Wenfei,Geerts F,Li Jianzhong,et al.Discovering conditional functional dependencies[J].IEEE Trans on Knowledge and Data Engineering,2011,23(5):683-698.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部