Skip to main content
Top

2018 | OriginalPaper | Chapter

Anonymization of Multiple and Personalized Sensitive Attributes

Authors : Jerry Chun-Wei Lin, Qiankun Liu, Philippe Fournier-Viger, Youcef Djenouri, Ji Zhang

Published in: Big Data Analytics and Knowledge Discovery

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the past, many algorithms have presented to hide the sensitive information but most of them identify the sensitive information as the same for all users/transactions, which is not a situation happened in realistic applications. In this paper, we present the (k, p)-anonymity framework to hide not only the multiple sensitive information but also the personal sensitive ones. Extensive experiments indicated that the proposed algorithm outperforms the-state-of-the-art algorithms in terms of information loss and runtime.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: The International Conference on Very Large Data Bases, pp. 487–499 (1994) Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: The International Conference on Very Large Data Bases, pp. 487–499 (1994)
3.
go back to reference Chen, M.S., Park, J.S., Yu, P.S.: Efficient data mining for path traversal patterns. IEEE Trans. Knowl. Data Eng. 10(2), 209–221 (1998)CrossRef Chen, M.S., Park, J.S., Yu, P.S.: Efficient data mining for path traversal patterns. IEEE Trans. Knowl. Data Eng. 10(2), 209–221 (1998)CrossRef
4.
go back to reference Doka, K., Xue, M., Tsoumakos, D., Karras, P.: k-anonymization by freeform generalization. In: ACM Symposium on Information, Computer and Communications Security, pp. 519–530 (2015) Doka, K., Xue, M., Tsoumakos, D., Karras, P.: k-anonymization by freeform generalization. In: ACM Symposium on Information, Computer and Communications Security, pp. 519–530 (2015)
6.
go back to reference Fournier-Viger, P., Lin, J.C.W., Kiran, R.U., Koh, Y.S., Thomas, R.: A survey of sequential pattern mining. Data Sci. Pattern Recogn. 1(1), 54–77 (2017) Fournier-Viger, P., Lin, J.C.W., Kiran, R.U., Koh, Y.S., Thomas, R.: A survey of sequential pattern mining. Data Sci. Pattern Recogn. 1(1), 54–77 (2017)
7.
go back to reference Gan, W., Lin, J.C.W., Fournier-Viger, P., Chao, H.C., Tseng, V.S., Yu, P.S.: A survey of utility-oriented pattern mining, arXiv:1805.10511 (2018) Gan, W., Lin, J.C.W., Fournier-Viger, P., Chao, H.C., Tseng, V.S., Yu, P.S.: A survey of utility-oriented pattern mining, arXiv:​1805.​10511 (2018)
8.
go back to reference Gan, W., Lin, J.C.W., Fournier-Viger, P., Chao, H.C., Yu, P.S.: A survey of parallel sequential pattern mining, arXiv:1805.10515 (2018) Gan, W., Lin, J.C.W., Fournier-Viger, P., Chao, H.C., Yu, P.S.: A survey of parallel sequential pattern mining, arXiv:​1805.​10515 (2018)
9.
go back to reference Ghinita, G., Kalnis, P., Tao, Y.: Anonymous publication of sensitive transactional data. IEEE Trans. Knowl. Data Eng. 23(2), 161–174 (2011)CrossRef Ghinita, G., Kalnis, P., Tao, Y.: Anonymous publication of sensitive transactional data. IEEE Trans. Knowl. Data Eng. 23(2), 161–174 (2011)CrossRef
10.
go back to reference Han, J., Pei, J., Yin, Y., Mao, R.: Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Min. Knowl. Discov. 8(1), 53–87 (2004)MathSciNetCrossRef Han, J., Pei, J., Yin, Y., Mao, R.: Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Min. Knowl. Discov. 8(1), 53–87 (2004)MathSciNetCrossRef
11.
go back to reference Hsu, C.H., Tsai, H.P.: KAMP: preserving k-anonymity for combinations of patterns. In: IEEE International Conference on Mobile Data Management, pp. 97–102 (2013) Hsu, C.H., Tsai, H.P.: KAMP: preserving k-anonymity for combinations of patterns. In: IEEE International Conference on Mobile Data Management, pp. 97–102 (2013)
12.
go back to reference Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE International Conference on Data Engineering, pp. 106–115 (2007) Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE International Conference on Data Engineering, pp. 106–115 (2007)
13.
go back to reference Lin, C.W., Hong, T.P., Hsu, H.C.: Reducing side effects of hiding sensitive itemsets in privacy preserving data mining. Sci. World J. 2014, Article ID 235837, 12 (2014) Lin, C.W., Hong, T.P., Hsu, H.C.: Reducing side effects of hiding sensitive itemsets in privacy preserving data mining. Sci. World J. 2014, Article ID 235837, 12 (2014)
14.
go back to reference Lin, C.W., Zhang, B., Yang, K.T., Hong, T.P.: Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Sci. World J. 2014, Article ID 398269, 13 (2014) Lin, C.W., Zhang, B., Yang, K.T., Hong, T.P.: Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Sci. World J. 2014, Article ID 398269, 13 (2014)
15.
go back to reference Lin, C.W., Hong, T.P., Yang, K.T., Wang, S.L.: The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl. Intell. 42(2), 210–230 (2015)CrossRef Lin, C.W., Hong, T.P., Yang, K.T., Wang, S.L.: The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl. Intell. 42(2), 210–230 (2015)CrossRef
16.
go back to reference Lin, C.W., Liu, Q., Fournier-Viger, P., Hong, T.P.: PTA: an efficient system for anonymizing transaction databases. IEEE Access 4, 6467–6479 (2016)CrossRef Lin, C.W., Liu, Q., Fournier-Viger, P., Hong, T.P.: PTA: an efficient system for anonymizing transaction databases. IEEE Access 4, 6467–6479 (2016)CrossRef
17.
go back to reference Kisilevich, S., Rokach, L., Elovici, Y., Shapira, B.: Efficient multidimensional suppression for K-anonymity. IEEE Trans. Knowl. Data Eng. 22, 334–347 (2010)CrossRef Kisilevich, S., Rokach, L., Elovici, Y., Shapira, B.: Efficient multidimensional suppression for K-anonymity. IEEE Trans. Knowl. Data Eng. 22, 334–347 (2010)CrossRef
18.
go back to reference Machanavajjhala, A., Kifer, D., Gehrke, J.: L-diversity: privacy beyond K-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 1–52 (2006) Machanavajjhala, A., Kifer, D., Gehrke, J.: L-diversity: privacy beyond K-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 1–52 (2006)
19.
go back to reference Poulis, G., Loukides, G., Skiadopoulos, S.: Privacy-preserving anonymization of set-valued data. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 353–369 (2013) Poulis, G., Loukides, G., Skiadopoulos, S.: Privacy-preserving anonymization of set-valued data. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 353–369 (2013)
20.
go back to reference Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, p. 188 (1998) Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, p. 188 (1998)
21.
go back to reference Sweeney, L.: k-anonymity: a model for protecting privacy. IEEE Sec. Priv. Mag. 10(5), 557–570 (2012)MathSciNetMATH Sweeney, L.: k-anonymity: a model for protecting privacy. IEEE Sec. Priv. Mag. 10(5), 557–570 (2012)MathSciNetMATH
22.
go back to reference Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 571–588 (2012)MathSciNetCrossRef Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 571–588 (2012)MathSciNetCrossRef
23.
go back to reference Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. VLDB Endow. 1, 115–125 (2008)CrossRef Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. VLDB Endow. 1, 115–125 (2008)CrossRef
24.
go back to reference Wang, Y., Xie, L., Zheng, B., Lee, K.C.K.: High utility K-anonymization for social network publishing. Knowl. Inf. Syst. 41, 697–725 (2014)CrossRef Wang, Y., Xie, L., Zheng, B., Lee, K.C.K.: High utility K-anonymization for social network publishing. Knowl. Inf. Syst. 41, 697–725 (2014)CrossRef
25.
go back to reference Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, W.C.: Utility-based anonymization using local recoding. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–790 (2006) Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, W.C.: Utility-based anonymization using local recoding. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–790 (2006)
26.
go back to reference Xu, Y., Wang, K., Fu, W.C., Yu, P.S.: Anonymizing transaction databases for publication. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 767–775 (2008) Xu, Y., Wang, K., Fu, W.C., Yu, P.S.: Anonymizing transaction databases for publication. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 767–775 (2008)
27.
go back to reference Xue, M, Karras, P., Raïssi, C., Vaidya, J., Tan, K.L.: Anonymizing set-valued data by nonreciprocal recoding. In: ACM Knowledge Discovery and Data Mining, pp. 1050–1058 (2012) Xue, M, Karras, P., Raïssi, C., Vaidya, J., Tan, K.L.: Anonymizing set-valued data by nonreciprocal recoding. In: ACM Knowledge Discovery and Data Mining, pp. 1050–1058 (2012)
Metadata
Title
Anonymization of Multiple and Personalized Sensitive Attributes
Authors
Jerry Chun-Wei Lin
Qiankun Liu
Philippe Fournier-Viger
Youcef Djenouri
Ji Zhang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-98539-8_16

Premium Partner