期刊文献+

一种支持数据修改的隐私保护策略 被引量:1

Strategy for Privacy Protection of Supporting Data Modification
下载PDF
导出
摘要 避免数据库中隐私数据的泄露,数据匿名化是实现隐私保护的一个有效手段。为了防止在多次发布中,链接攻击、背景知识攻击和同质攻击等引起的推理泄露,提出一种支持数据修改的隐私保护策略——m-inclusion规则。该规则同时运用了聚类算法,减少了信息的损失度,提高数据的实用性。与经典的m-invariance规则相比,更符合动态数据发布需求,不仅保护添加、删除时的隐私安全,还保证数据修改发布中的隐私安全。 To prevent data disclosure, data anonymity is an effective method to implement privacy protection. In order to prevent reasoning leak caused by linking attack, background knowledge attack and homogeneity attack etc. In multiple release, this paper puts forward a anonymous strategy to support data modification, called as m-inclusion principle. It also adopts clustering algo- rithm, which reduces the loss degree of information and improves the data practicality. Compared with m-invariance principle, m- inclusion more accords with dynamic data release demand. And it protects the privacy security flexibly.
出处 《计算机与现代化》 2013年第8期175-178,183,共5页 Computer and Modernization
基金 国家自然科学基金资助项目(61170221)
关键词 隐私保护 匿名化 数据重发布 数据修改 聚类 privacy protection anonymous data re-publication data modification clustering
  • 相关文献

参考文献12

  • 1Sweeney L. k-anonymity: A model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Knowl- edge Based Systems, 2002,10(5) :557-570.
  • 2Kristen LeFevre, David J DeWitt, Raghu Ramakrishnan. Mondrian multidimensional k-anonymity[ C ]/! Proceedings of the 22nd International Conference on Data Engineering. 2006:25.
  • 3Roberto J Bayardo, Rakesh Agrawal. Data privacy through optimal k-anonymization[ C ]//Proceedings of the 21st In- ternational Conference on Data Engineering. 2005: 217- 228.
  • 4Machanavajjhala A, Kifer D, Gehrke J, et al. L-diversity: Privacy beyond k-anonymity[ C ]//Proceedings of the 22nd International Conference on Data Eng/neering. 2006:24.
  • 5Wong R, Li J, Fu A, et al. (or, k)-anonymous data pub- lishing [ J ]. Journal of Intelligent Information Systems, 2009,33 (2) :209-234.
  • 6Xiao X, Tao Y. M-invariance: Towards privacy preserving re-publication of dynamic datasets [ C ]/! Proceedings of the 2007 ACM SIGMOD International Conference on Man- agement of Data. 2007:689-700.
  • 7Li F, Zhou S. Challenging More Updates: Towards Anony- mous Re-publication of Fully Dynamic Datasets [ EB/OL].http://arxiv, org/abs/0806. 4703, 2008-07-24.
  • 8张晓琳,毕红净.隐私保护动态数据集方法研究[J].内蒙古科技大学学报,2010,29(1):57-61. 被引量:1
  • 9王智慧,许俭,汪卫,施伯乐.一种基于聚类的数据匿名方法[J].软件学报,2010,21(4):680-693. 被引量:49
  • 10Aggarwal G, Panigrahy R,Thomas D, et al. Achieving an- onymity via clustering [ C ]// Proceedings of the Twenty- fifth ACM SIGMOD-SIGACT-SIGART Symposium on Prin- ciples of Database Systems. 2006 : 153-162.

二级参考文献10

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2Samarati P, Sweeney L. Generalizing data to provide anonymity when disclosing information [A]. Proceedings of the 17^th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database [ C ]. Seattle, Washington: 1998. 188.
  • 3Byun J W, Sohn Y, Bertino E, et al. Secure anonymization for incremental datasets[A]. The 3^rd VLDB Workshop on Secure Data Management[C]. Heidelberg :2006.48-63.
  • 4Machanavajjhala A, Gehrke J, and Kifer D. I-diversity: Privacy beyond k-anonymity[A]. Proc of IEEE Intl Conf on Data Engineering[C]. Piscataway, NJ: IEEE Press, 2006.
  • 5Benjamin C, Wang K, Ada Wai-Chee Fu, and Pei J. Anonymity for continuous data publishing[A]. Proceedings of the 11^th Int'l Conf on Extending datahase technology[C]. New Youk : ACM, 2008. 264-275.
  • 6Pei J, Xu J, Wang Z, et al. Maintaining k-anonymity against incremental updates[A]. Proc of the 19^th Intl Conf on Scientific and Statistical Database Management [C]. Banff, Canada. 2007.
  • 7Xiao X, Tao Y. m-invariance: Towards privacy preserving re-publication of dynamic datasets[A]. Proc of the ACM Sigmod Intl Conf on Management of Data[C]. New York: ACM Press,2007. 689-700.
  • 8Yingyi Bu,Ada Wai-Chee Fu,Raymond Chi-Wing Wong, et al. Privacy Preserving Serial Data Publishing By Role Composition[A]. The 34^th Intl Conf on Very Large Data Bases [C]. Auckland, New Zealand : 2008.
  • 9Li F,Zhou S. Challenging More Updates:Towards Anonymous Re-publication of Fully Dynamic Datasets [A]. Computing Research Repository[C]. New York :2008.
  • 10Jha S, Kruger L, Mcdaniel P. Privacy Preserving Clustering[A]. Proceedings of the 10^th European Symposium on Research in Computer Security[C]. Milan, Italy :2005.

共引文献48

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部