期刊文献+

k-匿名方法中准标识符的求解算法 被引量:7

Algorithm for Finding Quasi-identifiers in the k-anonymity Method
在线阅读 下载PDF
导出
摘要 k-匿名是保证视图安全的一种主要手段,如何找出正确的准标识符对k-匿名方法的有效性具有重要意义.针对这一问题,分析了不存在函数依赖和存在函数依赖两种情况下准标识符的组成特征,即当不存在函数依赖时,准标识符由视图间的公共属性组成,当存在函数依赖时,准标识符由视图间的公共属性和秘密信息包含的函数依赖关系的前件属性组成,在此基础上,给出了准标识符的通用求解算法,并用实验证明了算法的有效性和正确性. K-anonymity is a primary method which can guarantee the security of the publishing views. How to find out the accurate quasi-identifier of publishing views can impact the validity of k-anonymity in practice. In order to solve this problem, at first, the composing character of the quasi-identifier without or with FDs is analyzed. That is, if there are no FDs in the publishing views, the quasi-identifier of the publishing views is composed by the public attributes in the views, in the case where FDs are present in the publishing views, the quasi-identifier of the publishing views is composed not only by the public attributes in the views but also the left attributes of the functional dependency in the secret information. Then, the general algorithms for finding quasi-identifier in the publishing views are presented. At last, the validity and correctness of the algorithms are proved by the experiment results.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第9期1688-1693,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60773100)资助 教育部科学技术研究重点项目(205014)资助
关键词 视图安全 信息泄露 K-匿名 准标识符 view security information disclosure k-anonymity quasi-identifier
  • 相关文献

参考文献6

二级参考文献71

共引文献62

同被引文献78

  • 1张坤,刘国华.基于熵的视图安全性判定[J].计算机研究与发展,2006,43(z2):122-127. 被引量:4
  • 2陈子阳,郜时红,刘国华.基于k-匿名的视图发布安全问题的研究[J].计算机研究与发展,2006,43(z2):133-139. 被引量:5
  • 3郜时红,刘国华,聂俊岚,钱颖.基于先验知识的视图发布安全问题的研究[J].计算机研究与发展,2006,43(z3):206-211. 被引量:4
  • 4杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 5LIU Guohua GAO Shihong.A Method of Eliminating Information Disclosure in View Publishing[J].Wuhan University Journal of Natural Sciences,2006,11(6):1753-1756. 被引量:4
  • 6Sweeney L. K-Anonymity, A model for protecting privacy [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5): 557-570
  • 7Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression [J]. International Journal of Uncertainty, Fuzziness and Knowledge Based Systems, 2002, 10(5): 571-588
  • 8Sweeney L. Guaranteeing anonymity when sharing medical data: The datafly system [J]. Journal of the American Medical Informatics Association. 1997, 4(Suppl): 51-55
  • 9Hundepool A, Willenborg L. μ-and τ-argus: Software for statistical disclosure control [C]//Proc of the 3rd Int Seminar on Statistical Confidentiality. Ljubliana: Eurostat-Statistical Office of the Republic of Slovenia, 1996:208-217
  • 10Meyerson A, Williams R. On the complexity of optimal k- anonymity [C] //Proc of the ACM Syrup on Principles of Database Systems. New York: ACM, 2004:223-228

引证文献7

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部