期刊文献+

面向事务型数据隐私保护的p-剖分l-多样化算法 被引量:1

A p-anatomy l-diversity algorithm for protecting transactional data privacy
在线阅读 下载PDF
导出
摘要 目前关于隐私保护数据发布的研究大多是面向低维的关系型数据,其相关模型及算法无法直接用于解决稀疏的高维事务型数据发布中可能存在的隐私泄露问题.本文以剖分技术为基础,设计出一个面向隐私保护事务型数据发布的p-剖分l-多样化匿名算法.算法通过计算事务型数据中属性间的均方列联系数将高维属性集剖分成互不相交的p个属性子集,而后对事务型数据进行记录划分,使记录划分后的事务型数据关于p个属性子集满足l-多样化的要求.实验对匿名前后事务型数据的关联规则挖掘结果进行比较分析.理论分析和实验结果表明,本文的算法可安全地实现事务型数据发布的隐私保护,同时保证发布数据的可用性较高. Recently,privacy preserving data publishing has been a hot topic in data privacy preserving research fields.Exist research on privacy preserving data publishing mainly focuses on relational data with low dimensionality.However,many applications require privacy preserving publishing of transactional data,which has no structure and can be extremely high dimensional.Furthermore,unlike most previous works on relational data publishing,it is hard to distinguish transactional data as sensitive and non-sensitive,which makes traditional models and methods unusable.In this paper,we consider all the combination of itemsets in transactional data as potential quasi-identifiers and potential sensitive data,depending on the point of view of the adversary.Inspired by the anatomy technique,we propose a p-anatomy l-diversity algorithm for privacy preserving transactional data publishing.The algorithm firstly anatomizes the attribute set of the transactional data into p disjoint subsets by calculating the mean-square contingency coefficient between attributes,and then partitions the tuples of the transactional data into some equivalence classes,each of which satisfies the l-diversity requirement with respect to the above p attribute subsets.Experimental analysis is designed by comparing the rule number and the accuracy of association rules mining on the transactional data before and after publishing.The theoretical analysis and experimental results show that our algorithm can safely preserve the privacy in transaction data publication,while ensuring high utility of the released data.
出处 《南京大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第5期551-558,共8页 Journal of Nanjing University(Natural Science)
基金 国家自然科学基金(61003057) 福建省自然科学基金(2010J01330) 福州大学科技发展基金(2010-XY-20)
关键词 隐私保护 事务型数据 p-剖分 l-多样化 关联规则挖掘 privacy preserving transactional data p-anatomy l-diversity association rules mining
  • 相关文献

参考文献16

  • 1Samarati P. Protecting respondent's identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 2001, 13 (6):1010-1027.
  • 2Sweeney I.. k-anonymity: A modei for protecling privacy. International Journal on Uncertainty, Fuzziness and Knowledge Based Systems, 2002, 10(5): 557-570.
  • 3Machanavajjhala A, Gehrke J, Kifer D, et al. l- diversity: Privacy beyond k-anonymity. Proceedings of the 22^nd IEEE International Conference on Data Engineering. Atlanta, USA 2006, 24.
  • 4Li N, Li T. t- closeness: Privacy beyond k anonymity and l diversily. Proceedings of the 23^rd IEEE Iniernational Conference on Data Engineering. Istanbul, Turkey, 2007, 106-115.
  • 5Aggarwal C C. On k-anonymity and the durse of dimensionalily. Proceedings of the 31^st Very Large Data Bases Conference. Trondheim, Norway, 2005, 901-909.
  • 6Xu Y, Wang K, Fu A W C, et al. Anonymizing transaction databases for publicalion. Proceedings of the 14^th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Las Vegas, USA, 2008: 24--27.
  • 7Terrovitis M, Mamoulis N, Kalnis P. Anonymity in unstructured data. Hong Kong: Hong Kong University, 2008.
  • 8Terrovitis M, Mamoulis N, Kalnis P. l.ocal and global recoding methods for anonymizing set-valued data. International Journal on Very Large Data Bases, 2011, 20(2) : 83-106.
  • 9Xiao X, Tao Y. Anatomy: Simple and effective privacy preservalion. Proceedings of the 32^nd International Conference on Very Large Database. Seoul, Korea, 2006, 139-150.
  • 10Cram6r H. Mathematical methods of statistics. Princeton: Princeton University Press, 1948,282.

二级参考文献6

共引文献26

同被引文献5

引证文献1

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部