Skip to main content
Erschienen in: Wireless Personal Communications 3/2017

01.12.2016

An Improved Algorithm of Individuation K-Anonymity for Multiple Sensitive Attributes

verfasst von: Lin Zhang, Jie Xuan, Ruoqian Si, Ruchuan Wang

Erschienen in: Wireless Personal Communications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

At present, most of privacy preserving approaches in data publishing are applied to single sensitive attribute. However, applying single-sensitive-attribute privacy preserving techniques directly into data with multiple sensitive attributes often causes leakage of large amount of private information. This paper focuses on the privacy preserving methods in data publishing for multiple sensitive attributes. It combines data anonymous methods based on lossy join with the idea of clustering. And it proposes an improved algorithm of individuation K-anonymity for multiple sensitive attributes—\( MSA(\alpha ,l) \) algorithm. By setting parameters \( \alpha \) and \( l \), it can restrain sensitive attribute values in equivalence class, to make a more balanced distribution of sensitive attributes and satisfy the demand of diversity, then this algorithm is applied to K-anonymity model. Finally, the result of experiment shows that this improved model can preserve the privacy of sensitive data, and it can also reduce the information hidden rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhou, S. G., Li, F., Tao, Y. F., & Xiao, X. K. (2009). Privacy preservation in database applications: A survey. Chinese Journal of Computers, 32(5), 847–861.CrossRef Zhou, S. G., Li, F., Tao, Y. F., & Xiao, X. K. (2009). Privacy preservation in database applications: A survey. Chinese Journal of Computers, 32(5), 847–861.CrossRef
2.
Zurück zum Zitat Liu, X. Y., Wang, B., & Yang, X. C. (2014). Survey on privacy preserving techniques for publishing social network data. Journal of Software, 25(3), 576–590. Liu, X. Y., Wang, B., & Yang, X. C. (2014). Survey on privacy preserving techniques for publishing social network data. Journal of Software, 25(3), 576–590.
3.
Zurück zum Zitat Mehmood, A., Natgunanathan, I., Xiang, Y., et al. (2016). Protection of big data privacy. IEEE Access, 4, 1821–1834.CrossRef Mehmood, A., Natgunanathan, I., Xiang, Y., et al. (2016). Protection of big data privacy. IEEE Access, 4, 1821–1834.CrossRef
4.
Zurück zum Zitat Yi, X., Bouguettaya, A., Georgakopoulos, D. et al. (2015). Privacy protection for wireless medical sensor data. IEEE Transactions on Dependable & Secure Computing, 13(3), 1–1. Yi, X., Bouguettaya, A., Georgakopoulos, D. et al. (2015). Privacy protection for wireless medical sensor data. IEEE Transactions on Dependable & Secure Computing, 13(3), 1–1.
5.
Zurück zum Zitat Sweeney, L. (2002). K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge Based Systems, 10(5), 557–570.MathSciNetCrossRefMATH Sweeney, L. (2002). K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge Based Systems, 10(5), 557–570.MathSciNetCrossRefMATH
6.
Zurück zum Zitat Casino, F., Domingo-Ferrer, J., Patsakis, C., et al. (2015). A k-anonymous approach to privacy preserving collaborative filtering. Journal of Computer and System Sciences, 81(6), 1000–1011.CrossRef Casino, F., Domingo-Ferrer, J., Patsakis, C., et al. (2015). A k-anonymous approach to privacy preserving collaborative filtering. Journal of Computer and System Sciences, 81(6), 1000–1011.CrossRef
7.
Zurück zum Zitat Maheshwarkar, B., Patidar, P., Rawa, M. K. et al. (2016). K-AMOA: K-Anonymity model for multiple overlapped attributes. In International conference on information and communication technology for competitive strategies. ACM. Maheshwarkar, B., Patidar, P., Rawa, M. K. et al. (2016). K-AMOA: K-Anonymity model for multiple overlapped attributes. In International conference on information and communication technology for competitive strategies. ACM.
8.
Zurück zum Zitat Dai, I., Kikuchi, R., Chida, K. et al. (2015). k-Anonymous microdata release via post randomisation method. In Advances in Information and Computer Security. Springer International Publishing (pp. 225–241). Dai, I., Kikuchi, R., Chida, K. et al. (2015). k-Anonymous microdata release via post randomisation method. In Advances in Information and Computer Security. Springer International Publishing (pp. 225–241).
9.
Zurück zum Zitat Han, J. M., Yu, J., Yu, H. Q., & Jia, J. (2011). A multi-level-diversity model for numerical sensitive attributes. Journal of Computer Research and Development, 48(1), 147–158. Han, J. M., Yu, J., Yu, H. Q., & Jia, J. (2011). A multi-level-diversity model for numerical sensitive attributes. Journal of Computer Research and Development, 48(1), 147–158.
10.
Zurück zum Zitat Josep, Domingo-Ferrer, & Jordi, Soria-Comas. (2015). From t-closeness to differential privacy and vice versa in data anonymization. Knowledge-Based Systems, 74(1), 151–158. Josep, Domingo-Ferrer, & Jordi, Soria-Comas. (2015). From t-closeness to differential privacy and vice versa in data anonymization. Knowledge-Based Systems, 74(1), 151–158.
11.
Zurück zum Zitat Han, J. M., Yu, J., Yu, H. J., & Jia, J. (2010). Individuation privacy preservation oriented to sensitive values. Acta Electronica Sinica, 38(7), 1723–1728. Han, J. M., Yu, J., Yu, H. J., & Jia, J. (2010). Individuation privacy preservation oriented to sensitive values. Acta Electronica Sinica, 38(7), 1723–1728.
12.
Zurück zum Zitat Ren, X., Jia B., & Wang K. (2013). Anatomy: Uncertain data k-anonymity privacy protection algorithm. In 2nd International conference on mechatronics and control engineering (ICMCE 2013). Dalian, Peoples Republic China. Ren, X., Jia B., & Wang K. (2013). Anatomy: Uncertain data k-anonymity privacy protection algorithm. In 2nd International conference on mechatronics and control engineering (ICMCE 2013). Dalian, Peoples Republic China.
13.
Zurück zum Zitat Zheng, Yuhui, Jeon, Byeungwoo, Danhua, Xu, Jonathan Wu, Q. M., & Zhang, H. (2015). Image segmentation by generalized hierarchical fuzzy C-means algorithm. Journal of Intelligent and Fuzzy Systems, 28(2), 961–973. Zheng, Yuhui, Jeon, Byeungwoo, Danhua, Xu, Jonathan Wu, Q. M., & Zhang, H. (2015). Image segmentation by generalized hierarchical fuzzy C-means algorithm. Journal of Intelligent and Fuzzy Systems, 28(2), 961–973.
14.
Zurück zum Zitat Yang, X. C., Wang, Y. Z., Wang, B., & Yu, G. (2008). Privacy preserving approaches for multiple sensitive attributes in data publishing. Chinese Journal of Computers, 31(4), 574–587.CrossRef Yang, X. C., Wang, Y. Z., Wang, B., & Yu, G. (2008). Privacy preserving approaches for multiple sensitive attributes in data publishing. Chinese Journal of Computers, 31(4), 574–587.CrossRef
15.
Zurück zum Zitat Xie, J., Zhang, J. P., Yang, J., & Zhang, B. A. (2014). Privacy preserving approach based on attributes correlation partition for multiple sensitive attributes. Acta Electronica Sinica, 42(9), 1718–1723. Xie, J., Zhang, J. P., Yang, J., & Zhang, B. A. (2014). Privacy preserving approach based on attributes correlation partition for multiple sensitive attributes. Acta Electronica Sinica, 42(9), 1718–1723.
16.
Zurück zum Zitat Mubark, A. A., Elabd, E., & Abdulkader, H. (2016). Semantic anonymization in publishing categorical sensitive attributes. In International conference on knowledge and smart technology. IEEE. Mubark, A. A., Elabd, E., & Abdulkader, H. (2016). Semantic anonymization in publishing categorical sensitive attributes. In International conference on knowledge and smart technology. IEEE.
17.
Zurück zum Zitat Yang, G., Li, J., Zhang, S. et al. (2013). An enhanced l-diversity privacy preservation. In International conference on fuzzy systems and knowledge discovery (pp. 1115–1120). Yang, G., Li, J., Zhang, S. et al. (2013). An enhanced l-diversity privacy preservation. In International conference on fuzzy systems and knowledge discovery (pp. 1115–1120).
18.
Zurück zum Zitat Xiao, X., & Tao, Y. (2006). Anatomy: Simple and effective privacy pres-Ervation. In Proceedings of the 32nd international conference on very large data bases. Seoul, Korea (pp. 139–150). Xiao, X., & Tao, Y. (2006). Anatomy: Simple and effective privacy pres-Ervation. In Proceedings of the 32nd international conference on very large data bases. Seoul, Korea (pp. 139–150).
19.
Zurück zum Zitat Machanavajjhala, A., Gehrke, J., & Kifer, D. (2007). l-diversity :Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 1(1), 1–52.CrossRef Machanavajjhala, A., Gehrke, J., & Kifer, D. (2007). l-diversity :Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 1(1), 1–52.CrossRef
20.
Zurück zum Zitat Sun, J. G., Liu, J., & Zhao, L. Y. (2008). Clustering algorithms research. Journal of Software, 19(1), 48–61.CrossRefMATH Sun, J. G., Liu, J., & Zhao, L. Y. (2008). Clustering algorithms research. Journal of Software, 19(1), 48–61.CrossRefMATH
21.
Zurück zum Zitat Chong, Z. H., Ni, W. W., Liu, T. T., & Zhang, Y. (2010). A privacy-preserving data publishing algorithm for clustering application. Journal of Computer Research and Development, 47(12), 2083–2089. Chong, Z. H., Ni, W. W., Liu, T. T., & Zhang, Y. (2010). A privacy-preserving data publishing algorithm for clustering application. Journal of Computer Research and Development, 47(12), 2083–2089.
22.
Zurück zum Zitat Sun, K., Liu, J., & Wang, X. Y. (2009). K-means cluster algorithm with refined initial center. Journal of Shenyang Normal University (Natural Science), 27(4), 448–450. Sun, K., Liu, J., & Wang, X. Y. (2009). K-means cluster algorithm with refined initial center. Journal of Shenyang Normal University (Natural Science), 27(4), 448–450.
23.
Zurück zum Zitat Qi, J., Yu, Y., Wang, L. et al. (2016). K*-means: An effective and efficient k-means clustering algorithm. In IEEE international conferences on big data and cloud computing (BDCloud), social computing and networking (SocialCom), sustainable computing and communications (SustainCom) (BDCloud-SocialCom-SustainCom). IEEE Computer Society (pp. 242–249). Qi, J., Yu, Y., Wang, L. et al. (2016). K*-means: An effective and efficient k-means clustering algorithm. In IEEE international conferences on big data and cloud computing (BDCloud), social computing and networking (SocialCom), sustainable computing and communications (SustainCom) (BDCloud-SocialCom-SustainCom). IEEE Computer Society (pp. 242–249).
24.
Zurück zum Zitat Ye, H., Lv, H., & Sun, Q. (2016). An improved semi-supervised K-means clustering algorithm. In IEEE information technology, networking, electronic and automation control conference. Ye, H., Lv, H., & Sun, Q. (2016). An improved semi-supervised K-means clustering algorithm. In IEEE information technology, networking, electronic and automation control conference.
25.
Zurück zum Zitat Li, J. T., Liu, Y. H., & Hao, Y. (2016). The improvement and application of a K-means clustering algorithm. In IEEE international conference on cloud computing and big data analysis. IEEE. Li, J. T., Liu, Y. H., & Hao, Y. (2016). The improvement and application of a K-means clustering algorithm. In IEEE international conference on cloud computing and big data analysis. IEEE.
Metadaten
Titel
An Improved Algorithm of Individuation K-Anonymity for Multiple Sensitive Attributes
verfasst von
Lin Zhang
Jie Xuan
Ruoqian Si
Ruchuan Wang
Publikationsdatum
01.12.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3922-4

Weitere Artikel der Ausgabe 3/2017

Wireless Personal Communications 3/2017 Zur Ausgabe

Neuer Inhalt