Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 4/2020

16-07-2019 | RESEARCH ARTICLE - SPECIAL ISSUE - INTELLIGENT COMPUTING and INTERDISCIPLINARY APPLICATIONS

Adaptive k-Anonymity Approach for Privacy Preserving in Cloud

Authors: Karuna Arava, Sumalatha Lingamgunta

Published in: Arabian Journal for Science and Engineering | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Data privacy is very essential attribute for information sharing in cloud applications. Many end users find it challenging to adopt advanced technologies of cloud services, such as software-as-a-service, application-as-a-service, for protection of sensitive data in their health applications. Considerable research has been done in Privacy Preservation of sensitive data while ‘statistical analysis using data mining techniques’ such as k-anonymity being prominent. The term k-anonymity with respect to privacy of sensitive data is referred as sensitive information of an individual published and which cannot be distinguished from at least \(k-1\) individuals. k-Anonymity is achieved precisely with clustering techniques. However, the challenge is to find the best seed values for collecting allied records which can be anonymized at the same level in order to reduce information loss. This paper proposes a systematic approach for seed selection to cluster the records using the adaptive k-anonymity algorithm. A comparative study of recent works with a goal to reduce information loss and execution time is calibrated.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yang, J.-J.; Jian-Qiang, L.; Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Futur. Gener. Comput. Syst. 43–44, 74–86 (2015)CrossRef Yang, J.-J.; Jian-Qiang, L.; Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Futur. Gener. Comput. Syst. 43–44, 74–86 (2015)CrossRef
2.
go back to reference Zhang, X.; Liu, C.; Nepal, S.; Chen, J.: An efficient quasiidentifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79, 542–555 (2013)CrossRef Zhang, X.; Liu, C.; Nepal, S.; Chen, J.: An efficient quasiidentifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79, 542–555 (2013)CrossRef
3.
go back to reference Xiao, X.K.; Tao, Y.F.: Anonymity: simple and effective privacy preservation. In: Proceedings of 32nd International Conference on Very Large Databases (VLDB ’06), pp. 139–150, Seoul, Korea (2006) Xiao, X.K.; Tao, Y.F.: Anonymity: simple and effective privacy preservation. In: Proceedings of 32nd International Conference on Very Large Databases (VLDB ’06), pp. 139–150, Seoul, Korea (2006)
4.
go back to reference Sweeney, L.: k-Anonymity: a model for protection privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRef Sweeney, L.: k-Anonymity: a model for protection privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRef
5.
go back to reference El Emam, K.; Dankar, F.K.: Protecting privacy using k-anonymity. J. Am. Med. Inform. Assoc. 15(5), 627–37 (2008)CrossRef El Emam, K.; Dankar, F.K.: Protecting privacy using k-anonymity. J. Am. Med. Inform. Assoc. 15(5), 627–37 (2008)CrossRef
6.
go back to reference Gkoulalas-Divanis, A.; Loukides, G.; Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4–19 (2014)CrossRef Gkoulalas-Divanis, A.; Loukides, G.; Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4–19 (2014)CrossRef
7.
go back to reference Hundepool, A.; Willenborg, L.: \(\mu \)- and \(\tau \)-argus, software for statistical disclosure control. In: Third International Seminar on Statistical Confidentiality. Bled, (1996) Hundepool, A.; Willenborg, L.: \(\mu \)- and \(\tau \)-argus, software for statistical disclosure control. In: Third International Seminar on Statistical Confidentiality. Bled, (1996)
8.
go back to reference Sweeney, L.: Guaranteeing anonymity when sharing medical data, the Datafly system. J. Am. Med. Inform. Assoc. Washington, Hanley & Belfus, Inc., (1997) Sweeney, L.: Guaranteeing anonymity when sharing medical data, the Datafly system. J. Am. Med. Inform. Assoc. Washington, Hanley & Belfus, Inc., (1997)
9.
go back to reference LeFevre, K.; DeWitt, D.J.; Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. 24th ACM SIGMOD International Conference on Management of Data, pp. 49–60. Baltimore, Maryland (2005) LeFevre, K.; DeWitt, D.J.; Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. 24th ACM SIGMOD International Conference on Management of Data, pp. 49–60. Baltimore, Maryland (2005)
10.
go back to reference Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of the eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of the eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
11.
go back to reference LeFevre, K.; DeWitt, D.J.; Ramakrishnan, R.: Mondrian multidimensional \(k\)-anonymity. In: 22nd International Conference on Data Engineering (ICDE 06), p. 25, Atlanta, Georgia (2006) LeFevre, K.; DeWitt, D.J.; Ramakrishnan, R.: Mondrian multidimensional \(k\)-anonymity. In: 22nd International Conference on Data Engineering (ICDE 06), p. 25, Atlanta, Georgia (2006)
12.
go back to reference Li, J.Y.; Wong, R.C.; Fu, A.W.; Pei, J.: Achieving \(k\)-anonymity by clustering in attribute hierarchical structures. In: 8th International Conference on Data Warehousing and Knowledge Discovery, pp. 405–416, Krakow (2006) Li, J.Y.; Wong, R.C.; Fu, A.W.; Pei, J.: Achieving \(k\)-anonymity by clustering in attribute hierarchical structures. In: 8th International Conference on Data Warehousing and Knowledge Discovery, pp. 405–416, Krakow (2006)
13.
go back to reference Ni, S.; Xie, M.; Qian, Q.: Clustering based k-anonymity algorithm for privacy preservation. Int. J. Netw. Secur. 19(6), 1062–1071 (2017) Ni, S.; Xie, M.; Qian, Q.: Clustering based k-anonymity algorithm for privacy preservation. Int. J. Netw. Secur. 19(6), 1062–1071 (2017)
14.
go back to reference Pierangela, S.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)CrossRef Pierangela, S.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)CrossRef
15.
go back to reference Byun, J.-W.; Kamra, A.; Bertino, E.; Li, N.: Efficient \(k\)-anonymization using clustering techniques. In: International Conference on Database System for Advanced Applications (DASFAA), (2007) Byun, J.-W.; Kamra, A.; Bertino, E.; Li, N.: Efficient \(k\)-anonymization using clustering techniques. In: International Conference on Database System for Advanced Applications (DASFAA), (2007)
16.
go back to reference Loukides, G.; Shao, J.: Capturing data usefulness and privacy protection in \(k\)-anonymisation. In: Proceedings of the 2007 ACM Symposium on Applied Computing Loukides, G.; Shao, J.: Capturing data usefulness and privacy protection in \(k\)-anonymisation. In: Proceedings of the 2007 ACM Symposium on Applied Computing
17.
go back to reference Janakiramaiah, B.; Reddy, A.R.M.: Privacy preserving association rule mining by concept of impact factor using item lattice. WSEAS Trans. Comput. 14, 567–581 (2014) Janakiramaiah, B.; Reddy, A.R.M.: Privacy preserving association rule mining by concept of impact factor using item lattice. WSEAS Trans. Comput. 14, 567–581 (2014)
19.
go back to reference Chiu, C.-C.; Tsai, C.-Y.: A \(k\)-anonymity clustering method for effective data privacy preservation. In: Third International Conference on Advanced Data Mining and Application (ADMA) (2007) Chiu, C.-C.; Tsai, C.-Y.: A \(k\)-anonymity clustering method for effective data privacy preservation. In: Third International Conference on Advanced Data Mining and Application (ADMA) (2007)
20.
go back to reference Lin, J.-L.; Wei, M.-C.: An efficient clustering method for \(k\)-anonymization. In: International Workshop on Privacy and Anonymity in The Information Society, (2008) Lin, J.-L.; Wei, M.-C.: An efficient clustering method for \(k\)-anonymization. In: International Workshop on Privacy and Anonymity in The Information Society, (2008)
21.
go back to reference Lin, J.-L.; Wei, M.-C.; Li, C.-W.; Hsieh, K.-C.: A hybrid method for \(k\)-anonymization. In: 2008 IEEE Asia-pacific Services Computing Conference Lin, J.-L.; Wei, M.-C.; Li, C.-W.; Hsieh, K.-C.: A hybrid method for \(k\)-anonymization. In: 2008 IEEE Asia-pacific Services Computing Conference
22.
go back to reference EnamulKabir, M.; Wang, H.; Bertinov, E.: Efficient systematic clustering method for k-anonymization. Acta Inform. 48, 51–66 (2011)MathSciNetCrossRef EnamulKabir, M.; Wang, H.; Bertinov, E.: Efficient systematic clustering method for k-anonymization. Acta Inform. 48, 51–66 (2011)MathSciNetCrossRef
23.
go back to reference Pranamik, M.I.; Lau, R.Y.K.; Zhang, W.: \(k\)-anonymity through the enhanced clustering method. In: IEEE International Conference for e-Business Engineering, (2016) Pranamik, M.I.; Lau, R.Y.K.; Zhang, W.: \(k\)-anonymity through the enhanced clustering method. In: IEEE International Conference for e-Business Engineering, (2016)
24.
go back to reference Abouelmehdi, K.; Beni-Hessane, A.; Khalouf, H.: Big healthcare data: preserving security and privacy. J. Big Data 5, 1 (2018)CrossRef Abouelmehdi, K.; Beni-Hessane, A.; Khalouf, H.: Big healthcare data: preserving security and privacy. J. Big Data 5, 1 (2018)CrossRef
25.
go back to reference Xu, L.; Jiang, C.; Chen, Y.; Wang, J.; Ren, Y.: A framework for categorizing and applying privacy-preservation techniques in big data mining. IEEE Comput. Soc. 49(2), 54–62 (2016)CrossRef Xu, L.; Jiang, C.; Chen, Y.; Wang, J.; Ren, Y.: A framework for categorizing and applying privacy-preservation techniques in big data mining. IEEE Comput. Soc. 49(2), 54–62 (2016)CrossRef
26.
go back to reference Rong, H.; Wang, H.; Liu, J.; Xian, M.: Privacy-preserving \(k\)-nearest neighbor computation in multiple cloud environments. In: IEEE Access on Volume: 4 Rong, H.; Wang, H.; Liu, J.; Xian, M.: Privacy-preserving \(k\)-nearest neighbor computation in multiple cloud environments. In: IEEE Access on Volume: 4
27.
go back to reference Liu, F.; Li, T.: A clustering \(k\)-anonymity privacy-preserving method for wearable IoT devices. In: Hindawi, Security and Communication Networks, Wiley, (2018) Liu, F.; Li, T.: A clustering \(k\)-anonymity privacy-preserving method for wearable IoT devices. In: Hindawi, Security and Communication Networks, Wiley, (2018)
28.
go back to reference Zheng, W.; Wang, Z.; Lv, T.; Ma, Y.; Jia, C.: \(k\)-Anonymity algorithm based on improved clustering. In: Vaidya, J.; Li, J. (Eds.) ICA3PP 2018, LNCS 11335, pp. 462–476. Springer Nature, Switzerland (2018) Zheng, W.; Wang, Z.; Lv, T.; Ma, Y.; Jia, C.: \(k\)-Anonymity algorithm based on improved clustering. In: Vaidya, J.; Li, J. (Eds.) ICA3PP 2018, LNCS 11335, pp. 462–476. Springer Nature, Switzerland (2018)
29.
go back to reference Aha, D.; Murphy, P.; Merz, C.; Keogh, E.; Blake, C.: Seth Hettich. David Newman, UCI Repository of Machine Learning Datasets (1987) Aha, D.; Murphy, P.; Merz, C.; Keogh, E.; Blake, C.: Seth Hettich. David Newman, UCI Repository of Machine Learning Datasets (1987)
30.
go back to reference Fung, B.C.M.; Wang, K.; Yu, P.S.: Top–down specialization for information and privacy preservation. In: 21st International Conference on Data Engineering, pp. 205–216, (2005) Fung, B.C.M.; Wang, K.; Yu, P.S.: Top–down specialization for information and privacy preservation. In: 21st International Conference on Data Engineering, pp. 205–216, (2005)
31.
go back to reference Lin, J.-L.; Wei, M.-C.: Genetic algorithm-based clustering approach for k-anonymization. Exp. Syst. Appl. 36, 9784–9792 (2009)CrossRef Lin, J.-L.; Wei, M.-C.: Genetic algorithm-based clustering approach for k-anonymization. Exp. Syst. Appl. 36, 9784–9792 (2009)CrossRef
Metadata
Title
Adaptive k-Anonymity Approach for Privacy Preserving in Cloud
Authors
Karuna Arava
Sumalatha Lingamgunta
Publication date
16-07-2019
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 4/2020
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-019-03999-0

Other articles of this Issue 4/2020

Arabian Journal for Science and Engineering 4/2020 Go to the issue

Research Article - Computer Engineering and Computer Science

Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study

Research Article - Computer Engineering and Computer Science

LSB Pseudorandom Algorithm for Image Steganography Using Skew Tent Map

Research Article-Computer Engineering and Computer Science

Shortest Path Computation in a Network with Multiple Destinations

Premium Partners