期刊文献+

面向多敏感属性保护的p-覆盖k-匿名算法 被引量:1

A p-Cover k-Anonymity Algorithm for Protecting Multiple Sensitive Attributes
下载PDF
导出
摘要 隐私保护数据发布是近年来数据挖掘研究中的一个热点.匿名是隐私保护数据发布的一种常用技术.针对当前大部分匿名方法只考虑单敏感属性保护的不足,提出一个p-覆盖k-匿名模型,用于具有逻辑依赖关系的多敏感属性保护,并基于该模型设计出一个支持多敏感属性保护的匿名算法kpCover.仿真实验表明,基于p-覆盖k-匿名模型的算法kpCover能有效解决多敏感属性的删除泄露问题,同时保证发布数据具有较高的数据质量.算法是有效可行的. Privacy preserving data publishing is a hot topic in data mining research community. Anonymity is a popular technique in privacy preserving data publishing. Many anonymous methods have been presented for privacy preserving data publishing. However,most of the existing methods only consider protecting single sensitive attribute. In this paper,we firstly propose a p-cover k-anonymity model to protect multiple sensitive attributes with functional dependency. Then an optimal global-recoding algorithm based on this model is presented. The simulation experiments on real datasets show that the proposed model and algorithm can effectively solve the eliminate disclosure in multiple sensitive attributes, while ensuring high data quality of the released data.
出处 《南京师大学报(自然科学版)》 CAS CSCD 北大核心 2013年第4期41-47,共7页 Journal of Nanjing Normal University(Natural Science Edition)
基金 国家自然科学基金(61300026) 福州大学科技发展基金(2012-XQ-27)
关键词 隐私保护 数据发布 p-覆盖k-匿名 多敏感属性 privacy preserving, data publishing,p-cover k-anonymity, multiple sensitive attributes
  • 相关文献

参考文献12

  • 1Samarati P. Protecting respondent's identities in microdata release [ J ]. IEEE Transactions on Knowledge and Data Engineering, 2001,13 ( 6 ) : 1 010-1 027.
  • 2Sweeney L. k-anonymity : A model for protecting privacy [ J ]. International Journal on Uncertainty, Fuzziness and Knowledge- based Systems ,2002,10 (5) :557-570.
  • 3Machanavajjhala A, Gehrke J, Kifer D. /-diversity: Privacy beyond k-anonymity [ C ]//Proc of IEEE Int' 1 Conf on Data Engineering. Piscataway : IEEE Press,2006.
  • 4周水庚,李丰,陶宇飞,肖小奎.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-861. 被引量:219
  • 5Fung B C M, Wang K, Chen R, et al. Privacy-preserving data publishing: A survey on recent developments [ J ]. ACM Computing Surveys,2010,42(4) ,Article 14:1-53.
  • 6Truta T, Vinay B. Privacy protection :p-sensitive k-anonymity property [ C ]//Proc of the 22nd Int' 1 Conf on Data Engineering Workshops( ICDEW'06). Atlanta,2006:94.
  • 7杨晓春,王雅哲,王斌,于戈.数据发布中面向多敏感属性的隐私保护方法[J].计算机学报,2008,31(4):574-587. 被引量:58
  • 8Nergiz M E, Atzori M, Clifton C. Hiding the presence of individuals from shared databases [ C ]//SIGMOD. Beijing, 2007: 531-542.
  • 9LeFevre K, DeWitt D J, Ramakrishnan R. Incognito:efficient full-domain k-anonymity [ C ]//Proc of the ACM SIGMOD Int' 1 Conf on Management of Data. New York :ACM Press ,2005.
  • 10Asuncion A, Newman D J. UCI Machine Learning Repository [OL]. http ://relearn. its. uci. edu/ML Repository. htm1,2007.

二级参考文献90

共引文献260

同被引文献14

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部