全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2018 

基于聚类的S-KACA匿名隐私保护算法 S-KACA anonymity privacy protection based on clustering algorithm

Keywords: K-匿名,敏感隐私保护度,聚类算法,KACA算法,K-Prototypes-S-KACA算法

Full-Text   Cite this paper   Add to My Lib

Abstract:

KACA是一种基于局域泛化的K-匿名化方法.基于该算法,结合敏感属性隐私保护度,提出了一种S-KACA算法.该算法能够更有针对性地保护敏感隐私属性,而且使发布后数据的可用性较高,但由于其在保护敏感隐私信息时设置了一个隐私保护度的参数,会影响算法执行效率,使大规模的数据集应用有一定的局限性.为解决这个问题,引入一个高效的聚类算法——K-Prototypes算法,并将其与S-KACA算法相结合,提出一种K-Prototypes-SKACA算法.该算法首先通过聚类算法K-Prototypes将整个微数据集划分成几个较大的簇,然后再采用S-KACA算法对这些簇的微数据进行匿名化处理.实验验证K-Prototypes-S-KACA算法在隐私保护程度和数据可用性的大小与S-KACA算法相近,但是算法运行效率却得到了很大的提高

References

[1]  Jing Y,Chao W,Zhang J P.Micro-aggregation algorithm based on sensitive attribute entropy[J].Tien Tzu Hsueh Pao/Acta Electronica Sinica,2014,42(7):1327-1337.
[2]  Cheng L,Cheng S,Jiang F.ADKAM:A-diversity Kanonymity model via microaggregation[C]//Information Security Practice and Experience,2015:533-547.
[3]  Sun Xiaoxun.A family of enhanced(L,α)-diversity models for privacy preserving data publishing[J].Future Generation Computer Systems,2011,27(3):348-356.
[4]  Soria-Comas J,Domingo-Ferrer J.Probabilistic K-anonymity through microaggregation and data swapping[C]//IEEE International Conference on Fuzzy Systems,2012:1-8.
[5]  Xu X,Numao M.An efficient generalized clustering method for achieving K-anonymization[C]//International Symposium on Computing&NETWORKING,IEEE,2015:499-502.
[6]  Aghdamm M R S,Sonehara N.Efficient local recoding anonymization for datasets without attribute hierarchical structure[C]//International Conference on Cyber Security,2013.
[7]  Yu L,Yang Q.An efficient local-recoding K-anonymization algorithm based on clusterin[M].Transactions on Edutainment XI,2015.
[8]  唐印浒,钟诚.基于变长聚类的多敏感属性概率K-匿名算法[J].计算机工程与设计,2014,(8):2660-2665.Tang Yinhu,Zhong Cheng.K-anonymity algorithm of multi-sensitive attribute probabilistic based on variablelength clustering[J].Computer Engineering and Design,2014,(8):2660-2665.
[9]  Sharma V.Methods for privacy protection using K-anonymity[C]//Optimization,Reliabilty,and Information Technology(ICROIT),2014International Conference on,IEEE,2014:149-152.
[10]  Hajkacem M A B,N’Cir C E B,Essoussi N.Parallel K-prototypes for clustering big data[C]//Computational Collective Intelligence.Springer International Publishing,2015.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133