期刊文献+

基于聚类的l-多样性匿名方法

I-diversity anonymity method based on clustering
在线阅读 下载PDF
导出
摘要 -多样性(I-diversity)模型采用传统基于概念层次结构的数据概化策略,在对敏感属性进行匿名保护时往往会造成不必要的信息损失。针对这一问题,将聚类技术引入数据匿名中,提出一种基于聚类的I-diversity匿名保护方法。该方法在满足I-diversity模型的约束条件下,采用基于距离的层次化聚类算法划分元组,对不同类型的准标识符使用不同的概化策略,并依据数据概化前后属性值不确定性程度的变化描述数据概化带来的信息损失。同现有的I-diversity模型相比,该方法能较好地保护用户的敏感属性,并且在一定程度上降低了概化处理带来的信息损失。 The traditional data generalization strategy of l-diversity model is based on the concept-hierarchy structure, but this kind of data generalization strategy may cause some unnecessary loss of information as taking measure of anonymous protection to sensitive attributes. To solve this problem, the technique of cluster for data anonymity is adopted and a corresponding anonymous protection method is proposed. Under the constraint condition of /-diversity model, the new method makes partition oftuple ac- cording to the hierarchical clustering algorithm based on distance, take different generalization strategy for different kinds of iden- tifiers, and describe the loss ofinformation caused by data generalization according to the change of uncertainty degree of attributes. By contrast with the original model, the new model proposed in this paper performs better than in the protection of customer's sen- sitive attribute and can reduce the information loss caused by the generalization to some degree.
出处 《燕山大学学报》 CAS 2012年第1期32-38,共7页 Journal of Yanshan University
基金 河北省自然科学基金资助项目(F2011203219)
关键词 匿名保护 数据概化 信息损失 聚类I-diversity anonymous protection data generalized information loss clustering l-diversity
  • 相关文献

参考文献3

二级参考文献39

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2Machanavajjhala A,Gehrke J,Kifer D.l-Diversity:Privacy beyond K-anonymity.In:Liu L,Reuter A,Whang KY,Zhang J,eds.Proc.of the 22nd Int'l Conf.on Data Engineering.Atlanta:IEEE Computer Society,2006.24-35.
  • 3Wong RC,Li J,Fu AW,Wang K.(a,k)-Anonymity:An enhanced K-anonymity model for privacy-preserving data publishing.In:Eliassi-Rad T,Ungar LH,Craven M,Gunopulos D,eds.Proc.of the 12th Int'l Conf.on Knowledge Discovery and Data Mining.New York:ACM Press,2006.754-759.
  • 4Li N,Li T,Venkatasubramanian S.t-Closeness:Privacy beyond k-anonymity and l-diversity.In:Dogac A,Ozsu T,Sellis T,eds.Proc.of the 23rd Int'l Conf.on Data Engineering.Istanbul:IEEE Computer Society,2007.106-115.
  • 5Xiao X,Tao Y.Personalized privacy protecting.In:Chaudhuri S,Hristidis V,Polyzotis N,eds.Proc.of the Int'l Conf.on Management of Data.Chicago:ACM Press,2006.229-240.
  • 6Fung BCM,Wang K,Yu PS.Top-Down specialization for information and privacy preservation.In:Aberer K,Franklin M,Nishio S,eds.Proc.of the 21st Int'l Conf.on Data Engineering.Tokyo:IEEE Computer Society,2005.205-216.
  • 7LeFevre K,DeWitt DJ,Ramakrishnan R.Incognito:Efficient full-domain K-anonymity.In:Ozcan F,ed.Proc.Of the Int'l Conf.On Management of Data.Maryland:ACM Press,2005.49-60.
  • 8Aggarwal G,Feder T,Kenthapadi K,Motwani R,Panigrahy R,Thomas D,Zhu A.Anonymizing tables.In:Eiter T,Libkin L,eds.Proc.of the 10th Int'l Conf.on Database Theory.Edinburgh:Springer-Verlag,2005.246-258.
  • 9Wang K,Fung BCM.Anonymizing sequential releases.In:Eliassi-Rad T,Ungar LH,Craven M,Gunopulos D,eds.Proc.of the 12th Int'l Conf.on Knowledge Discovery and Data Mining.Philadelphia:ACM Press,2006.414-423.
  • 10Xiao X,Tao Y.Anatomy:Simple and effective privacy preservation.In:Dayal U,Whang KY,Lomet DB,Alonso G,Lohman GM,Kersten ML,Cha SK,Kim YK,eds.Proc.of the 32nd Int'l Conf.on Very Large Data Bases.Seoul:VLDB Endowment,2006.139-150.

共引文献93

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部