期刊文献+

A New Anonymity Model for Privacy-Preserving Data Publishing 被引量:5

A New Anonymity Model for Privacy-Preserving Data Publishing
下载PDF
导出
摘要 Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity attack and the similarity attack. This paper proposes a novel model, (w,γ, k)-anonymity, to avoid generality attacks on both cases of numeric and categorical attributes. We show that the optimal (w, γ, k)-anonymity problem is NP-hard and conduct the Top-down Local recoding (TDL) algorithm to implement the model. Our experiments validate the improvement of our model with real data. Privacy-preserving data publishing(PPDP) is one of the hot issues in the field of the network security.The existing PPDP technique cannot deal with generality attacks,which explicitly contain the sensitivity attack and the similarity attack.This paper proposes a novel model,(w,y,k)-anonymity,to avoid generality attacks on both cases of numeric and categorical attributes.We show that the optimal(w,y,k)-anonymity problem is NP-hard and conduct the Top-down Local recoding(TDL) algorithm to implement the model.Our experiments validate the improvement of our model with real data.
出处 《China Communications》 SCIE CSCD 2014年第9期47-59,共13页 中国通信(英文版)
基金 supported in part by Research Fund for the Doctoral Program of Higher Education of China(No.20120009110007) Program for Innovative Research Team in University of Ministry of Education of China (No.IRT201206) Program for New Century Excellent Talents in University(NCET-110565) the Fundamental Research Funds for the Central Universities(No.2012JBZ010) the Open Project Program of Beijing Key Laboratory of Trusted Computing at Beijing University of Technology Beijing Higher Education Young Elite Teacher Project(No. YETP0542)
关键词 data security privacy protection ANONYMITY data publishing 数据发布 隐私保护 名模 PDP技术 网络安全 分类属性 攻击 相似性
  • 相关文献

参考文献2

二级参考文献17

  • 1李小勇,杨月华.Trusted Data Acquisition Mechanism for Cloud Resource Scheduling Based on Distributed Agents[J].China Communications,2011,8(6):108-116. 被引量:4
  • 2McDaniel P, McLaughlin S. Security and privacy chal- lenges in the smart grid. IEEE Security & Privacy, 2009, 7(3): 75-77.
  • 3Vaccaro A, Popov M, Villacci D, et al. An integrated framework for smart microgrids modeling, monitoring, control, communication, and verification. Proceedings of the 1EEE, 2011, 99(1): 119-132.
  • 4Yang W, Li W, Lu J. Reliability analysis of wide-area measurement system. IEEE Transactions on Power Deliv- ery, 2011, 25(3): 1483-1491.
  • 5The Smart Grid Interoperability Panel Cyber Security Working Group. Nistir 7628 guidelines for smart grid cy- ber security: Vol. 2, privacy and the smart grid. http:// csrc.nist.gov/publications/nistir/ir7628/nistr-7628_vo12 .pdf. Sept. 2010.
  • 6ESMIG Expert Group 2. Regulatory recommendations for data safety, data handling and data protection, http://ec.eu- ropa.eu/energy/gas_electricity/smartgrids/doc/expert_group 2.pdf. Feb. 2011.
  • 7Amin M. Challenges in reliability, security, efficiency, and resilience of energy infrastructure: Toward smart self-healing electric power grid. In Proc. of 2008 IEEE Power and Energy Society General Meeting (PES08). Pittsburgh, USA, 2008: 1-5.
  • 8Khurana H, Hadley M, Lu N, et al. Smart-grid security issues. IEEE Security & Privacy, 2010, 8(1): 81-85.
  • 9Clements S, Kirkham H. Cyber-security considerations forthe smart grid. In: Proc. of 2010 IEEE Power and Energy Society General Meeting (PES10). Minnesota, USA, 2010: 1-5.
  • 10Metke A R, Ekl R L. Security technology for smart grid networks. IEEE Transactions on Smart Grid, 2010, 1(1): 99-107.

共引文献1

同被引文献17

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部