期刊文献+

基于聚类的分级匿名方法 被引量:5

Clustering-based approach for multi-level anonymization
在线阅读 下载PDF
导出
摘要 为了防止链接攻击导致隐私的泄露,同时尽可能降低匿名保护时的信息损失,提出(λα,k)-分级匿名模型。该模型根据隐私保护的需求程度,将各敏感属性值划分为高、中、低三个等级类,通过隐私保护度参数λ灵活控制泄露风险。在此基础上,给出一种基于聚类的分级匿名方法。该方法采用一种新层次聚类算法,并针对准标识符中数值型属性与分类型属性采用灵活的概化策略。实验结果显示,该方法能够满足敏感属性的分级匿名保护需求,同时有效地减少信息损失。 To prevent the privacy disclosure caused by linking attack and reduce information loss resulting from anonymous protection, a (λα, k) multi-level anonymity model was proposed. According to the requirement of privacy preservation, sensitive attribute values could be divided into three levels: high, medium, and low. The risk of privacy disclosure was flexibly controlled by privacy protection degree parameter λ. On the basis of this, clustering-based approach for multi-level anonymization was proposed. The approach used a new hierarchical clustering algorithm and adopted more flexible strategies of data generalization for numerical attributes and classified attributes in a quasi-identifier. The experimental results show that the approach can meet the requirement of multi-level anonymous protection of sensitive attribute, and effectively reduce information loss.
作者 桂琼 程小辉
出处 《计算机应用》 CSCD 北大核心 2013年第2期412-416,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61262075) 广西高等学校重大科研项目(201201ZD012) 广西教育厅科研项目(200911LX119)
关键词 隐私保护 数据发布 数据匿名 分级 聚类 信息损失 privacy preservation data publishing data anonymization multi-level clustering information loss
  • 相关文献

参考文献15

  • 1SWEENEY L. k-anonymity:a model for protecting privacy[J].International Journal on Uncertainty Fuzziness and Knowledgebased Systems,2002,(05):557-570.
  • 2MEYERSON A,WILLIAMS R. On the complexity of optimal k-anonymity[A].New York:ACM,2004.223-228.
  • 3AGGARWAL G,FEDER T,KENTHAPADI K. Anonymizing tables[A].Beilin:Springer-Verlag,2005.246-258.
  • 4MACHANAVAJJHALA A,GEHRKE J,KIFER D. l-diversity:privacy beyond k-anonymity[A].Washington,DC:IEEE Computer Society,2006.24-35.
  • 5LI N H,LI T C,VENKATASUBRAMANIAN S. t-closeness:privacy beyond k-anonymity and l-diversity[A].Washington,DC:IEEE Computer Society,2007.106-115.
  • 6WONGRC-C,LIJY,FU AW-C. (α,k)-anonymity:an enhanced k-anonymity model for privacy-preserving data publishing[A].New York:ACM,2006.754-759.
  • 7WONG R,LI J Y,FU A. (α,k)-anonymous data publishing[J].Journal of Intelligent Information Systems,2009,(02):209-234.doi:10.1007/s10844-008-0075-2.
  • 8杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 9童云海,陶有东,唐世渭,杨冬青.隐私保护数据发布中身份保持的匿名方法[J].软件学报,2010,21(4):771-781. 被引量:45
  • 10王智慧,许俭,汪卫,施伯乐.一种基于聚类的数据匿名方法[J].软件学报,2010,21(4):680-693. 被引量:50

二级参考文献64

  • 1葛伟平,汪卫,周皓峰,施伯乐.基于隐私保护的分类挖掘[J].计算机研究与发展,2006,43(1):39-45. 被引量:20
  • 2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 3张鹏,童云海,唐世渭,杨冬青,马秀莉.一种有效的隐私保护关联规则挖掘方法[J].软件学报,2006,17(8):1764-1774. 被引量:53
  • 4Sweeney L.Achieving k-anonymity privacy protection using generalization and suppression[J].International Journal on Uncertainty,Fuzziness and Knowldege-Based Systems,2002,10(5):571-588.
  • 5Agrawal R,Srikant R.Privacy-preserving data mining[C]// Proc of SIGMOD 2000.New York:ACM.2000:439-450.
  • 6Wong R,Li J,Fu A,et al.(alpha,k)-anonymity,An enhanced k-anonymity model for privacy-preserving data publishing[C] aProc of KDD2006.New York:ACM,2006:754-759.
  • 7Aggrawal G,Feder T,Kenthapadi K,et al.Anomyrnizing tables[C] //Proc of ICDT 2005.Berlin:Springer,2005:236-258.
  • 8Machanavajjhala A,Gehrke J.Kifer D.1-diversity:Privacy beyond k-anonymity[C] //Proc of ICDE 2006.Los Alamitoa,CA:IEEE Computer Society,2006:24-35.
  • 9Lefevre K,Dewht D J.Ramakrishnan R.Incognhn: Efficient full domain k anonymity[C] //Proc of SIGMOD 2005.New York:ACM.2005:49-60.
  • 10Fung BC M,Wang K,Yu P S.Top-down specialization for information and privacy preservation[C] //Proc of ICDE 2005.Los Alamitos.CA:IEEE Computer Society.2005:205-216.

共引文献202

同被引文献43

  • 1张岐山,郑丽君.基于灰关联分析的V-MDAV算法研究[J].计算机应用研究,2020,37(1):107-111. 被引量:3
  • 2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 3XU Yang,MA Tinghuai,TANG Meili,et al.A survey of privacy preserving data publishing using generalization and suppression[J].Applied Mathematics & Information Sciences,2014,8(3):1103-1116.
  • 4Sweeney L.k-anonymity:A model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge based Systems,2002,10(5):557-570.
  • 5WONG Chiwing,LI Jiuyongi FU Waichee,et al.(α,k)-anonymity:An enhanced k-anonymity model for privacy preserving data publishing[C]//Proceeding of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York:ACM,2006:754-759.
  • 6Tassa T,Mazza A,Gionis A.k-Concealment:An alternative model of k-type anonymity[J].Transactions on Data Privacy,2012,5(1):189-222.
  • 7Sarowar Sattar A H M,LI Jiuyong,DING Xiaofeng,et al.A general framework for privacy preserving data publishing[J].Knowledge-Based Systems,2013,54(4):276-287.
  • 8Machanavajjhala A,Kifer D,Gehrke J.l-diversity:Privacy beyond k-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):1-52.
  • 9SUN Xiaoxun,LI Min,WANG Hua.A family of enhanced(L,α)-diversity models for privacy preserving data publishing[J].Future Generation Computer Systems,2011,27(3):348-356.
  • 10Abdalaal A,Nergiz M E,Saygin Y.Privacy-preserving publishing of opinion polls[J].Computers & Security,2013,37(3):143-154.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部