Skip to main content
Top

2019 | OriginalPaper | Chapter

Effective L-Diversity Anonymization Algorithm Based on Improved Clustering

Authors : Wantong Zheng, Yong Ma, Zhongyue Wang, Chunfu Jia, Peng Li

Published in: Cyberspace Safety and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mass data has been collected and released everyday, at the same time, the published data contains a lot of sensitive information related to individuals. K-anonymity privacy preserving mechanisms can prevent the disclosure of individual privacy information in the scenarios of data publication. L-diversity further considers the distribution of sensitive attributes in equivalence classes to avoid homogeneity attacks. In this paper, we propose an improved L-diversity algorithm based on clustering, and we consider the L-diversity demand of sensitive attributes while clustering to achieve K-anonymity. We minimize the total information loss of each equivalence class by choosing records which has minimal loss of information, regardless of whether they have different sensitive attributes, until the number of distinct values of sensitive attribute in the equivalence class reaches L. This algorithm we conduct experiments on UCI Adult data set and compared with traditional (K,L)-member algorithm. Theoretical analysis and the experimental results demonstrate that the improved L-diversity algorithm can not only improve the privacy protection degree of sensitive data, but also effectively reduce the information loss.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. (CSUR) 21(4), 515–556 (1989)CrossRef Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. (CSUR) 21(4), 515–556 (1989)CrossRef
2.
go back to reference Agrawal, R., Srikant, R.: Privacy-preserving data mining, vol. 29. ACM (2000) Agrawal, R., Srikant, R.: Privacy-preserving data mining, vol. 29. ACM (2000)
5.
go back to reference Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16(9), 1026–1037 (2004)CrossRef Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16(9), 1026–1037 (2004)CrossRef
6.
go back to reference Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106–115. IEEE (2007) Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106–115. IEEE (2007)
7.
go back to reference Machanavajjhala, A., Gehrke, J.: On the efficiency of checking perfect privacy. In: Proceedings of the Twenty-Fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 163–172. ACM (2006) Machanavajjhala, A., Gehrke, J.: On the efficiency of checking perfect privacy. In: Proceedings of the Twenty-Fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 163–172. ACM (2006)
8.
go back to reference Machanavajjhala, A., Gehrke, J., Kifer, D.: L-diversity: privacy beyound kanonymity. ACM Trans. Knowl. Discov. Data (TKDD) l(1), 24–35 (2007) Machanavajjhala, A., Gehrke, J., Kifer, D.: L-diversity: privacy beyound kanonymity. ACM Trans. Knowl. Discov. Data (TKDD) l(1), 24–35 (2007)
9.
go back to reference Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proceedings of the Twenty-Third ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 223–228. ACM (2004) Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proceedings of the Twenty-Third ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 223–228. ACM (2004)
10.
go back to reference Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. J. Comput. Syst. Sci. 73(3), 507–534 (2007)MathSciNetCrossRef Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. J. Comput. Syst. Sci. 73(3), 507–534 (2007)MathSciNetCrossRef
11.
go back to reference Moore Jr., R.A.: Controlled data-swapping techniques for masking public use microdata sets. In: Statistical Research Division Report Series RR 96–04 (1996) Moore Jr., R.A.: Controlled data-swapping techniques for masking public use microdata sets. In: Statistical Research Division Report Series RR 96–04 (1996)
12.
go back to reference Muralidhar, K., Sarathy, R.: Data shuffling–a new masking approach for numerical data. Manage. Sci. 52(5), 658–670 (2006)CrossRef Muralidhar, K., Sarathy, R.: Data shuffling–a new masking approach for numerical data. Manage. Sci. 52(5), 658–670 (2006)CrossRef
13.
go back to reference Murphy, C.: Data masking with classical ciphers. In: SAS Global Forum (2010) Murphy, C.: Data masking with classical ciphers. In: SAS Global Forum (2010)
14.
go back to reference Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: PODS, vol. 98, p. 188. Citeseer (1998) Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: PODS, vol. 98, p. 188. Citeseer (1998)
15.
go back to reference Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Tech. rep., SRI International (1998) Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Tech. rep., SRI International (1998)
17.
go back to reference Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)MathSciNetCrossRef Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)MathSciNetCrossRef
Metadata
Title
Effective L-Diversity Anonymization Algorithm Based on Improved Clustering
Authors
Wantong Zheng
Yong Ma
Zhongyue Wang
Chunfu Jia
Peng Li
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-37352-8_29

Premium Partner