期刊文献+

隐私保护关系型数据发布的多维划分动态规划算法 被引量:2

A dynamic programming algorithm based on multidimensional partitioning for privacy preserving relational data publishing
下载PDF
导出
摘要 目前大部分隐私保护关系型数据发布算法均未能有效兼顾算法效率和发布数据的可用性.从空间多维划分的角度研究关系型数据发布中的隐私保护问题,发现前期研究提出的基于子空间划分的隐私保护最优k-匿名动态规划算法(k-ASPDP)可适用于多种隐私保护机制,进而设计出一种基于多维划分的隐私保护关系型数据发布动态规划算法框架Bottom-Up MG,并针对动态规划算法k-ASPDP空间复杂度较大的不足,提出一个空间可扩展性强的混合k-匿名化算法k-ASPDP+.实验分别对以l-多样性为隐私保护机制的Bottom-Up MG算法和k-ASPDP+算法所发布数据的可用性及算法效率与同类算法进行比较分析.实验结果表明,本文算法是有效可行的. Recently,privacy preserving data publishing has been a hot topic in data privacy preserving research fields.The goal of privacy preserving data publishing is to propose safe and effective algorithms for data processing before data releasing,while ensuring high utility of the released data.However,most of the previous works on privacy preserving relational data publishing can not effectively take into account the algorithm efficiency and the availability of publishing data.In this paper,we revisit privacy preserving relational data publishing from the perspective of space multidimensional partitioning.It is found that subspace partitioning based dynamic programming algorithm k-ASPDP designed in our previous work for optimal k-anonymization can be applied to multiple privacy preserving mechanisms.Based on this,a dynamic programming algorithm framework Bottom-Up MG based on multidimensional partitioning for privacy preserving relational data publishing is presented in this paper.After that,in order to overcome the deficiency of high space complexity of the dynamic programming algorithm k-ASPDP,we propose a hybrid k-anonymous algorithm k-ASPDP+ with high spatial scalability.Experimental analysis are designed by comparing Bottom-Up MG under l-diversity privacy preserving mechanism as well as k-ASPDP+ and the traditional algorithm on the released data availability and the algorithm efficiency.Experimental results show that the proposed algorithms in this paper are effective and feasible.
出处 《南京大学学报(自然科学版)》 CAS CSCD 北大核心 2013年第2期258-267,共10页 Journal of Nanjing University(Natural Science)
基金 福建省自然科学基金(2010J01330) 福州大学科技发展基金(2010-XY-18 2010-XY-20)
关键词 隐私保护 关系型数据发布 多维划分 动态规划 算法 privacy preservation relational data publishing multidimensional partitioning dynamic programming algorithm
  • 相关文献

参考文献3

二级参考文献91

共引文献246

同被引文献22

  • 1Aulbach S, Grust T, Jacobs D, et al. Multi-tenant databases for Software as a Service: Schema- mapping techniques. In: Proceedings of the ACM SIGMOD International Conference on Manage- ment of Data. Canada: SIGMOD Conference, 2008,1195--1206.
  • 2Aulbach S, Jacobs D, Kemper A, et al. A comparison of flexible schemas for software as a service. ImProceedings of the ACM SIGMOD In- ternational Conference on Management of Data. Rhode Island: SIGMOD Conference, 2009, 881--888.
  • 3Wang C, Wang Q, Ren K, et al. Ensuring data storage security in cloud computing. In: The 17th International Workshop on Quality of Service. Charleston.. IEEE Press, 2009,1 -- 9.
  • 4Liu H, Zhang P, Liu J. Public data integrity verification for secure cloud storage. Journal of Networks, 2013,8 ( 2 ) : 373 -- 380.
  • 5Li L, Li Q, Kong L, et al. Tenant-oriented composite authentication tree for data integrity protection in SaaS. In: The 15'h International Conference on Web-Age Information Manage- ment. Maeau:Lecture Notes in Computer Science 8485,2014,402--414.
  • 6Zhang L, Li Q, Shi Y, et al. An integrity verification scheme for multiple replicas in clouds. In: The 2012 International Conference on Web Information Systems and Mining. Chengdu.. Lecture Notes in Computer Science 7529, Springer, 2012,264-- 274.
  • 7Wang Q, Wang C, Li J, et al. Enabling public ver- ifiability and data dynamics for storage security in cloud computing. In: The 14th European Symposium on Research in Computer Security. Saint-Malo: Lecture Notes in Computer Science 5789, Springer, 2009,355 -- 370.
  • 8Dan Boneh,Gentry C, Lynn B,et al. A survey of two signature aggregation techniques. Crypto- gamie Bryologie, 2003,6 (2) : 1 -- 10.
  • 9Barsoum A F, Hasan M A. On verifying dynamic multiple data copies over cloud servers. Cryptology ePrint Archive, Report, 2011,447.
  • 10Bowers K D,Juels A,Oprea A. HAIL:A high a- vailability and integrity layer for cloud storage. In..Proceedings of the 2009 ACM Conference on Computer and Communications Security. Chicago : ACM, 2009,187 -- 198.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部