期刊文献+

实现单敏感属性多样性的微聚集算法 被引量:3

Microaggregation algorithm for single sensitive attribute diversely
下载PDF
导出
摘要 针对k-匿名方法无法抵抗同质性攻击和背景知识攻击的问题,提出了实现敏感属性多样性的微聚集算法,该算法把距离类中心最近的敏感属性值不同的l个元组聚为一类,在满足l-多样性的前提下对该类进行扩展。实验结果表明,该算法能够有效地生成满足敏感属性多样性的匿名表。 Traditional k-anonymity methods cannot resist homogeneity attack and background knowledge attack. In order to solve this problem, this paper proposes a sensitive attribute diversity micro-aggregation algorithm, the algorithm groups l nearest tuples to cluster center into one group, which has l different sensitive values. It extends this cluster based on satisfying the l-diversity, so the anonymous table l-diversity yield by the algorithm satisfies sensitive attribute l-diversity can resist homogeneity attack and background knowledge attack. Experimental results show that the algorithm can generate anonymity table to satisfy the needs of sensitive attribute diversity, and to ensure the availability of anonymous table.
作者 王茜 张刚景
出处 《计算机工程与应用》 CSCD 北大核心 2015年第11期72-75,共4页 Computer Engineering and Applications
基金 科技部国家科技支撑计划重点项目(No.2011BAH25B04)
关键词 隐私保护 微聚集 K-匿名 l-多样性 privacy protection microaggregation k-anonymization l-diversity
  • 相关文献

参考文献15

  • 1Samarati P,Sweeney L.Generalizing data to provide anonymity when disclosing information(abstract)[C] //Proc of the 17th ACM-SIGMOD-SIGACT-SIGART Symposium on the Principles of Database System.Seattle,WA,USA:IEEE Press,1988.
  • 2Machanavajjhala A,Gehrke J,Kifer D.L-diversity:privacy beyond k-anonymity[C] //Proc of the 22nd International Conference on Data Engineering.Atlanta,GA,USA:IEEE Press,2006:24-36.
  • 3杨晓春,王雅哲,王斌,于戈.数据发布中面向多敏感属性的隐私保护方法[J].计算机学报,2008,31(4):574-587. 被引量:59
  • 4Li Zude,Zhan Guoqiang,Ye Xiaojun.Towards an anti inference(k,l)-anonymity model with value association rules[C] //Conference on Database and Expert Systems Applications.Krakow,Poland:Springer-Verlag,2006:883-893.
  • 5韩建民,岑婷婷,虞慧群.数据表k-匿名化的微聚集算法研究[J].电子学报,2008,36(10):2021-2029. 被引量:40
  • 6Domingo F J,Mateo S J M.Practical data-oriented microaggregation for statistical disclosure control[J].IEEE Transactions on Knowledge and Data Engineering,2002,14(1):189-201.
  • 7Domingo-Ferrer J,Torra V.Ordinal,continuous and heterogeneous k-anonymity through microaggregation[J].Journal of Data Mining and Knowledge Discovery,2005,11(2):195-202.
  • 8Torra V.Microaggregation for categorical variables:a median based approach[C] //LNCS 3050,Barcelona,Catalonia.Berlin Heidelberg:Springer,2004:162-174.
  • 9Oganian A,Domingo F J.On the complexity of optimal microaggregation for statistical disclosure control[J].Journal of Data Mining and Knowledge Discovery,2005,11(2):195-202.
  • 10Hundepool A,Van de Wetering A,Ramaswamy R,et al.μ-ARGUS version 4.0 software and user’s manual[EB/OL].(2007-02-14).http://neon.vb.cbs.nl/casc.

二级参考文献57

  • 1李洁,高新波,焦李成.基于特征加权的模糊聚类新算法[J].电子学报,2006,34(1):89-92. 被引量:113
  • 2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 3彭京,唐常杰,程温泉,石葆梅,乔少杰.一种基于层次距离计算的聚类算法[J].计算机学报,2007,30(5):786-795. 被引量:11
  • 4Samarati P, Sweeney L. Generalizing data to provide anonymity when disclosing information (abstract) [A ]. Proc of the 17th ACM-SIGMOD-SIGACT-SIGART Symposium on the Principles of Database Systems[C]. Seattle, WA, USA: IEEE press, 1998.188.
  • 5Samarafi P. Protecting respondents' identities in microdata release[J]. IEEE Transactions on Knowledge and Data Engineering,2001,13(6) : 1010 - 1027.
  • 6Sweeney L. K-anonymity: a model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledge- Based Systems,2002,10(5) :557 - 570.
  • 7Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression[ J]. International Jounlal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10 (5) :571 - 588.
  • 8Iyengar V. Transforming data to satisfy privacy constraints[A]. Proc of the 12th ACM SIGKDD Conference [C]. Edmonton, Alberta, Canada: ACM Press, 2002.279 - 288.
  • 9Yao C,Wang X S, Jajodia S. Checking for k-anonymity violation by views[A] .Proc of the 31st International Conference on Very Large Data Bases [C]. Trondheim, Norway: VLDB Endowment, 2005.910 - 921.
  • 10Machanavajjhala A, Gehrke J, Kifer D. L-diversity: privacy beyond k-anonymity[A]. Proc of the 22nd International Conference on Data Engineering[ C]. Atlanta, GA, USA: IEEE Press, 2006.24 - 36.

共引文献93

同被引文献24

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部