期刊文献+

面向近邻泄露的数值型敏感属性隐私保护方法

Privacy preserving approach based on proximity privacy for numerical sensitive attributes
下载PDF
导出
摘要 提出一种面向近邻泄露的数值型敏感属性隐私保护方法,该方法首先在保护准标识符属性和数值型敏感属性内在关系的前提下,将数值型敏感属性进行离散化划分;然后,提出一种面向近邻泄露的隐私保护原则——(k,ε)-proximity;最后,设计了最大邻域优先算法MNF(maximal neighborhood first)来实现该原则。实验结果表明,提出的方法能在有效保护数值型敏感信息不泄露的同时保持较高的数据效用,并且保护了数据间的关系。 A model based on proximity breach for numerical sensitive attributes is proposed. At first, it divides numerical sensitive value into several intervals on the premise of protecting the internal relations between quasi-identifier attributes and numerical sensitive attributes. Secondly, it proposes a (k, ε)- proximity privacy preserving principle to defense prox- imity privacy. In the end, a maximal neighborhood first algorithm (MNF) is designed to realize the (k, ε)-proximity. The experiment results show that the proposed model can preserve privacy of sensitive data well meanwhile it can also keep a high data utility and protect the internal relations.
出处 《通信学报》 EI CSCD 北大核心 2015年第4期96-104,共9页 Journal on Communications
基金 国家自然科学基金资助项目(61073041 61073043 61370083 61402126) 教育部高等学校博士学科点专项科研基金资助项目(20112304110011 20122304110012)~~
关键词 隐私保护 数值型敏感属性 近邻泄露 离散化 privacy preserving numerical sensitive attributes proximity privacy discretization
  • 相关文献

参考文献16

  • 1XU Y, MA T, TANG M, et al. A survey of privacy preserving data publishing using generalization and suppression[J]. Appl Math, 2014, 8(3): 1103-1116.
  • 2SWEENEY L. k-anonymity: a model for protecting privacy[J]. Inter- national Journal of Uncertainty, Fuzziness and Knowledge based Sys- tems, 2002, 10(5):557-570.
  • 3TASSA T, MAZZA A, GIONIS A. k-concealment: an alternative model of k-type anonymity[J]. Transactions on Data Privacy, 2012, 5(1): 189-222.
  • 4MACHANAVAJJHALA A, GEHRKE J, KIFER D. l-diversity: pri- vacy beyond k-anonymity [J]. ACM Transactions on Knowledge Dis- covery fi-om Data,2007,1(1):1-52.
  • 5ABDALAAL A, NERGIZ M E, SAYGIN Y. Privacy-preserving publishing of opinion polls[J]. Computers & Security, 2013, 37(9): 143-154.
  • 6SAROWAR S A H M, LI J, D1NG X, et al. A general framework for privacy preserving data publishing[J]. Knowledge-Based Systems, 2013, 54(12): 276-287.
  • 7YE M, WU X, HU X, et al. Anonymizing classification data using rough set theory[J]. Knowledge-Based Systems, 2013, 43(5): 82-94.
  • 8ZHANG Q, KOUDAS N, SRIVASTAVA D, et al. Aggregate query answering on anonymized tables[A].Data Engineering, 2007, ICDE 2007, IEEE 23rd International Conference[C]. 2007. 116-125.
  • 9LI J X, TAO Y F, XIAO X K. Preservation of proximity privacy in publishing numerical sensitive data [A]. Proceedings of ACM Con- ference on Management of Data (SIGMOD) [C]. 2008. 473-486,.
  • 10韩建民,于娟,虞慧群,贾泂.面向数值型敏感属性的分级l-多样性模型[J].计算机研究与发展,2011,48(1):147-158. 被引量:23

二级参考文献33

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2Samarati P, Sweeney L. Generalizing data to provide anonymity when disclosing information (abstract)[C] //Proc of the 17th ACM SIGMOD-SIGACT SIGART Syrup on the Principles of Database Systems. Piscataway, NJ: IEEE, 1998:188-3.88.
  • 3Samarati P. Protecting respondents' identities in microdata release [J]. IEEE Trans on Knowledge and Data Engineering. 2001, 13 (6) : 1010-1027.
  • 4Fung B C M, Wang K, Chen R, et al. Privacy-preserving data publishing: A survey on recent developments [J]. ACM Computing Surveys, 2010, 42(4): 1-53.
  • 5Machanavajjhala A, Gehrke J, Kifer D. L-diversity: Privacy beyond k-anonymity [C] //Proc of the 22nd Int Conf on Data Engineering. Piscataway, NJ: IEEE, 2006. 24-36.
  • 6Wong C R, Li J, Fu A, et al. (a, k)-anonymity: An enhanced k anonymity model for privacy preserving data publishing [C] //Proe of the 12th ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining. New York: ACM, 2006, 754-759.
  • 7Ye Xiaojun, Zhang Y W, Liu M. A personalized (a, k) anonymity model [C] //Proe of the 9th Int Conf on Web-Age Information Management. Berlin: Springer, 2008:341-348.
  • 8Xiao Xiaokui, Tao Yufen. Personalized privacy preservation [C] //Proc of the 25th ACM SIGMOD Int Conf on Management of Data. New York: ACM, 2006:229-240.
  • 9Li Zude, Zhan Guoqiang, Ye Xiaojun. Towards an antiinference(k,l) anonymity model with value assoeiation rules [C] //Proc of DEXA. Berlin: Springer, 2006:883-893.
  • 10Wu Min, Ye Xiaojun. Towards the diversity of sensitive attributes in k-anonymity [C] //Proc of the 2006 IEEE/WIC/ ACM Int Conf on Web Intelligence and Intelligent Agent Technology. Piscataway, NJ: IEEE, 2006:98-104.

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部