期刊文献+

基于差分隐私的数据匿名化隐私保护方法 被引量:17

Anonymized data privacy protection method based on differential privacy
下载PDF
导出
摘要 在保护数据隐私的匿名技术中,为解决匿名安全性不足的问题,即匿名过程中因计算等价类质心遭受同质性和背景知识攻击造成的隐私泄漏,提出了一种基于差分隐私的数据匿名化隐私保护方法,构建了基于差分隐私的数据匿名化隐私保护模型;在利用微聚集MDAV算法划分相似等价类并在匿名属性过程中引入SuLQ框架设计得到ε-MDAV算法,同时选用Laplace实现机制合理控制隐私保护预算。通过对比不同隐私保护预算下可用性和安全性的变化,验证了该方法可以在保证数据高可用性的前提下有效地提升数据的安全性能。 There exists the problem of security insufficience among the data privacy protecting technology which is the privacy leakage caused by homogeneity and background knowledge attack when computing equivalence classes in the anonymity process. To solve the problem, an anonymized data privacy protection method based on differential privacy was put forward, and its model was constructed. ε-MDAV (Maximum Distance to Average Vector) algorithm was presented, in which micro-aggregation MDAV algorithm was used to partition similar equivalence classes, and SuLQ frame framework was introduced into the anonymous attribute process. Laplace mechanism was used to reasonably control the privacy protection budget. The comparison of availability and security under different privacy protect budgets verifies that the proposed method effectively improve data security while guaranteeing high data availability.
出处 《计算机应用》 CSCD 北大核心 2016年第10期2753-2757,共5页 journal of Computer Applications
基金 国家科技支撑计划项目(2013BAB06B04) 江苏省自然科学基金资助项目(BK20130852) 江苏水利科技项目(2013025) 中国华能集团公司总部科技项目(HNKJ13-H17-04)~~
关键词 隐私保护 匿名 微聚集 隐私泄露 差分隐私 privacy protection anonymity mlcro-aggregation privacy leakage differential privacy
  • 相关文献

参考文献16

二级参考文献108

  • 1汪祖媛,庄镇泉,王煦法.逐维聚类的相似度索引算法[J].计算机研究与发展,2004,41(6):1003-1009. 被引量:5
  • 2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 3姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 4Machanavajjhala A,Gehrke J,Kifer D.L-diversity:Privacy Beyond k-Anonymity[C]//Proc.of the 22nd International Conference on Data Engineering.Atlanta,GA,USA:IEEE Press,2006.
  • 5Zhang Qing,Koudas N.Aggregate Query Answering on Anonymized Tables[C]//Proc.of International Conference on Data Engineering.Istanbul,Turkey:IEEE Press,2007.
  • 6Domingo F J.Microaggregation for Database and Location Privacy[C]//Proc.of NGITS'06.Kibbutz,Israel:[s.n.],2006.
  • 7Chang Chin-chen,Li Yu-chiang.TFRP:An Efficient Micro-aggregation Algorithm for Statistical Disclosure Control[J].System Software,2007,80(11):1866-1878.
  • 8Friedman J H.Flexible metric nearest neighbor classification[R]. Department of Statistics,Stanford University, 1994.
  • 9Hans-Peter K, Kroger P,Zimek A.Clustering high-dimensional data: A survey on subspace clustering, pattern-based clustering, and correlation clustering[J].ACM Transactions on Knowledge Dis- covery from Data,2009,3( 1 ) : 1-58.
  • 10Anagnostopoulos A, Kumar R, Mahdian M. Influence and correlation in social networks. In: Proc. of the 14th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining. ACM Press, 2008.7-15. [doi: 10.1145/1401890.1401897 ].

共引文献1031

同被引文献237

引证文献17

二级引证文献259

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部