期刊文献+

数据发布中k-匿名隐私保护技术研究 被引量:4

Research on K-anonymous Privacy Protection Technology in the Data Release
下载PDF
导出
摘要 随着互联网技术的迅猛发展,隐私保护已成为社会以及机构越来越关心的问题,数据挖掘技术的应用使得隐私泄露问题日益突出,隐私保护是目前数据发布中隐私泄露控制技术研究的热点问题之一,而K-匿名是近年来隐私保护研究的热点。本文介绍了K-匿名的基本概念,阐述了泛化与隐匿技术,研究了基于datafly的多维属性泛化K-匿名模型,并对该模型的基本原理、缺点进行分析,做出了相应的改进,在数据预处理阶段增加泛化层限制并且在准标识符属性选取时引入近似度分析,并对改进后的K-匿名进行实验,实验结果证明改进有效提高了处理后的数据精度。 With the rapid development of Internet technology,individuals and institutions are increasingly concerned about the issue of privacy protection.With the application of data mining technology,privacy leakage is becoming more and more serious.Privacy protection is one of the hot topics in the research of privacy leakage control technology in Data Publishing,and K-anonymous is the hotspot of privacy protection research in recent years.This paper introduces the basic concept of K-anonymous,expounds the generalization and hidden technology,introduces the multidimensional attribute generalization K-anonymous model based on Datafly,and the basic principle and the disadvantages of the model are analyzed.In addition,the corresponding improvement is made,the generalization layer is limited in the data preprocessing stage,and the approximation analysis is introduced in the selection of the identifier attribute,and the improved K-anonymity experiment is carried out.The experimental results show that the improved method effectively improves the accuracy of the processed data.
作者 岳思 吴伟明 谷勇浩 YUE Si;WU Wei-ming;GU Yong-hao(School of Computer Science, Beijing University of Post and Telecommunications, Beijing Key Laboratory of intelligent communication software and multimedia ,Beijing 100876, China;National Power Grid Corp information and communication branch, Beijing 100761, China)
出处 《软件》 2017年第11期12-17,共6页 Software
基金 国家自然科学基金项目资助(61173017 61370195) 工信部通信软科学项目资助(2014-R-42 2015-R-29) 国网科技项目(SGTYHT/15-JS-191)
关键词 数据发布 隐私保护 K-匿名 泛化与隐匿 datafly Data release Privacy protection K-Anonymous Generalization and Concealment Datafly
  • 相关文献

参考文献6

二级参考文献97

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2朱青,王珊,丁博麟,张孝,蔡宏艳,姚佳丽.基于数据网格面向服务的查询算法[J].计算机学报,2006,29(7):1234-1240. 被引量:8
  • 3Han J,Kamber M.Data Mining:Concepts and Techniques.2nd Edition.San Francisco:Morgan Kaufmann Publishers,2006.
  • 4Machanavajjhala A,Gehrke J,Kifer D,Venlita-Subramaniam M.1-diversity:Privacy beyond k-anonymity//Proceedings of the 22nd International Conference on Data Engineering(ICDE).Atlanta,Georgia,USA,2006:24-35.
  • 5Li N,Li T.t-closeness:Privacy beyond k-anonymity and l-diversity//Proceedings of the 23rd International Conference on Data Engineering (ICDE).Istan Buttom-up k-anonymity,Turkey,2007:106-115.
  • 6Sweeney L.Achieving k-anonymity privacy protection using generalization and suppression.International Journal on Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):571-588.
  • 7Xiao X,Tao Y.Personalized privacy preservation//Proceedings of the ACM SIGMOD Conference on Management of Data(SIGMOD).Atlanta,Georgia,USA,2006:229-240.
  • 8Aggarwal G,Feder T,Kenthapadi T,Khuller S,Panigrahy R,Thomas D,Zhu Z.Achieving anonymity via clustering//Proceedings of the Symposium on Principles of Database System(PODS).Chicago,Illinois,USA,2006:153-162.
  • 9Pei J,Xu J,Wang Z,Wang W,Wang K.Maintaining K-anonymity against incremental updates//Proceedings of the 19th International Conference on Scientific and Statistical Database Management(SSDBM).Banff,Canada,2007:5-14.
  • 10Xu Jian,Wang Wei,Pei Jian,Wang Xiaoyuan,Shi Baile,Fu Ada Wai-Chee.Utility-based anonymization using local recoding//Proceedings of the 12th International Conference on Knowledge Discovery and Data Mining (SIGKDD).Philadelphia,PA,USA,2006:785-790.

共引文献89

同被引文献61

引证文献4

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部