期刊文献+

基于改进K-匿名算法的个人信息隐私保护应用 被引量:3

Application of Personal Privacy Protection Based on Improved K-anonymity Algorithm
下载PDF
导出
摘要 研究个人信息隐私保护的方法。当前对个人信息的保护越来越重要,传统的个人信息隐私保护算法中,没有对个人信息的属性进行有效的分类,造成算法效率较低。为了避免上述传统算法的弊端,提出了一种基于改进K-匿名算法的个人信息隐私保护方法。建立完整的个人信息隐私保护算法评价体系,对个人信息隐私保护方法进行有效的评价。利用聚类方法,对个人信息背景数据进行分类处理,从而为个人信息隐私保护提供准确的数据基础。计算个人信息标识符,从而获取个人信息损失惩罚因子,最终完成个人信息隐私保护。实验结果表明,利用本文算法进行个人信息隐私保护,可以极大地提高隐私保护的效率,并且降低个人信息的损失,取得了令人满意的结果。 In this paper, a method to protect privacy of personal information was researched. To avoid the draw- backs of traditional algorithms, this paper proposed a method of protecting the privacy of personal information based on improved K-anonymity algorithm. Firstly, a complete algorithm evaluation system of personal information privacy protection was created to effectively evaluate the personal information privacy protection method. Then, a clustering method was used to classify personal background data, providing accurate data base for personal information privacy. Finally, the personal information identifier was calculated to get the loss penalty factor of personal information and complete the personal information privacy protection. The experimental results show that the algorithm presented in this paper for personal privacy, can greatly improve the efficiency of the privacy protection, reduce the loss of person- al information and obtain satisfactory results.
出处 《计算机仿真》 CSCD 北大核心 2014年第3期217-220,共4页 Computer Simulation
基金 2013河南省社科联(SKL-2013-598) 2014年河南省科技攻关计划项目(142102210041) 2014年河南省教育厅科学技术研究重点项目(14B520012)
关键词 个人信息 隐私保护 数据分类 聚类处理 Personal information Privacy protection Data classification Clustering process
  • 相关文献

参考文献8

  • 1楼树美,李淑玉.神经网络在光纤故障预警系统中的应用仿真[J].计算机仿真,2012,29(12):255-258. 被引量:7
  • 2L Sweeney. Achieving k-anonymity privacy protection using gener- alization and suppression [ J ]. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10 ( 5 ) : 571 - 588.
  • 3G Aggarwal, et al. k- Anonymity : algorithms and hardness [ R ]. Stanford University, Califomia, USA, Tech Rep: 2004- 22, 2004.
  • 4Kristen Lefevre, David J DeWitt, Raghu Ramakrishnan. Mondrian multidimensional k-anonymity [ C ]. In Proc. of International Con- ference on Data Engineering, Atlanla, Georgia, USA : IEEE Com- puter Society, 2006:25.
  • 5李学国,冯刚.面向社交网络隐私保护的数据挖掘方法研究[J].科技通报,2013,29(1):128-131. 被引量:7
  • 6Park Hyoungmin, Shim Kyuseck. Approximate algorithms for kano- nymity [ C ]. Beijing, China, Proceedings of the ACM SIGMOD 2007, New York : ACM, 2007 : 67-78.
  • 7B C M Fung, K Wang, P S Yu. Anonymizing classification data for privacy preservation[ C]. IEEE Transactions on Knowledge and Data Engineering, 2007,19 (5) : 711-725.
  • 8杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60

二级参考文献15

  • 1吕品,陈年生,董武世.面向隐私保护的数据挖掘技术研究[J].计算机技术与发展,2006,16(7):147-149. 被引量:9
  • 2Sweeney L.K-Anonymity:A model for protecting privacy.Int'l Journal on Uncertainty,Fuzziness and Knowledge Based Systems,2002,10(5):557-570.
  • 3Liu XY,Yang XC,Yu G.A representative classes based privacy preserving data publishing approach with high precision.Computer Science,2005,32(9A):368-373 (in English with Chinese abstract).
  • 4Meyerson A,Williams R.On the complexity of optimal k-anonymity.In:Deutsch A,ed.Proc.of the 23rd ACM SIGACT-SIGMOD-SIGART Symp.on Principles of Database Systems (PODS 2004).New York:ACM,2004.223-228.
  • 5Aggarwal G,Feder T,Kenthapadi K,Motwani R,Panigrahy R,Thomas D,Zhu A.Anonymizingtables.In:Eiter T,Libkin L,eds.Proc.of the 10th Int'l Conf.on Database Theory (ICDT 2005) LNCS 3363,Springer-Verlag,2005.246-258.
  • 6Iyengar V.Transforming data to satisfy privacy constraints.In:Zaiane O,ed.Proc.of the 8th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2002).New York:ACM,2002.279-288.
  • 7Yao C,Wang XS,Jajodia S.Checking fork-anonymity violation by views.In:Bohm K,Jensen CS,Hass LM,Kersten ML,Larson P,Ooi BC,eds.Proc.of the 31st Int'l Conf.on Very Large Data Bases (VLDB 2005).Trondheim:ACM,2005.910-921.
  • 8Sweeney L.Guaranteeing anonymity when sharing medical data,the Datafly system.In:Masys DR,ed.Proc.of the 1997American Medical Informatics Association Annual Fall Symp (AMIA'97).1997.51-55.http://www.amia.org/pubs/symposia/D004462.pdf
  • 9LeFevre K,DeWitt D,Ramakrishnan R.Incognito:Efficient full-domain k-anonymity.In:Ozcan F,ed.Proc.of the ACM SIGMOD Int'l Conf.on Management of Data.New York:ACM,2005.49-60.
  • 10Fung B,Wang K,Yu P.Top-Down specialization for information and privacy preservation.In:Toyama M,Sasaki S,eds.Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Tokyo:IEEE Computer Society,2005.205-216.

共引文献71

同被引文献22

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部