|
- 2017
多属性泛化的K-匿名算法
|
Abstract:
针对现有的K-匿名模型中存在泛化属性选取不唯一和数据过度泛化的问题,提出多属性泛化的K-匿名算法。在K-匿名模型实现的过程中,引入属性近似度概念,定量刻画准标识符属性的离散程度,进而确定泛化的准标识符属性;同时采用广度优先泛化的方法,避免数据被过度泛化,最终实现数据表的K-匿名要求。实验结果表明,多属性泛化的K-匿名模型可以提高泛化后数据精度,其处理效率和Datafly算法相当。该算法有效地解决了取值最多准标识符属性存在多个时的泛化属性选取问题,并且防止属性被过度泛化,提高数据的可用性。
[1] | LIU Qinghai, SHEN Hong, SANG Ying-peng. Privacypreserving data publishing for multiple numerical sensitive attributes[J]. Tsinghua Science and Technology, 2015, 20(3):246-254. |
[2] | 彭长根, 丁红发, 朱义杰, 等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016, 27(8):1891-1903. PENG Chang-gen, DING Hong-fa, ZHU Yi-jie, et al. Information entropy models and privacy metrics methods for privacy protection[J]. Journal of Software, 2016, 27(8):1891-1903. |
[3] | 韦茜, 李星毅. 基于K-匿名的快递信息隐私保护应用[J]. 计算机应用研究, 2014, 31(2):555-557. WEI Qian, LI Xing-yi. Express information protection application based on K-anonymity[J]. Application Research of Computers, 2014, 31(2):555-557. |
[4] | 吕品, 钟珞, 王文兵, 等. MA-Datafly:一种支持多属性泛化的K-匿名方法[J]. 计算机工程与应用, 2013, 49(4):138-139. Lü Pin, ZHONG Luo, WANG Wen-bing, et al. MA-Datafly:K-anonymity approaches for supporting multi-attribute generalization[J]. Computer Engineering & Applications, 2013, 49(4):138-139. |
[5] | HUNDEPOOL A, DOMINGOFERRER J, FRANCONI L, et al. Statistical disclosure control[M]. Chichester, UK:John Wiley & Sons Ltd, 2012. |
[6] | LI Tian-cheng, LI Ning-hui, ZHANG Jian, et al. Slicing:a new approach for privacy preserving data publishing[J]. IEEE Transactions on, Knowledge and Data Engineering, 2012, 24(3):561-574. |
[7] | MURPHY P M, AHA D W. University of California Irvine machine learning repository[EB/OL]. (1996-02-15). http://archive.ics.uci.edu/ml/. |
[8] | 晏华, 刘贵松. 采用熵的多维K-匿名划分方法[J]. 电子科技大学学报, 2007, 36(6):1228-1231. YAN Hua, LIU Gui-Song. Multidimensional K-anonymity partition method using entropy[J]. Journal of University of Electronic Science and Technology of China, 2007, 36(6):1228-1231. |
[9] | OLIVEIRA S R M, ZAIANE O R. Privacy preserving clustering by data transformation[J]. Journal of Information and Data Management, 2010, 1(1):37-51. |
[10] | LIN Chi, SONG Zi-hao, SONG Hou-bing, et al. Differential privacy preserving in big data analytics for connected health[J]. Journal of Medical Systems, 2016, 40(4):1-9. |
[11] | CHEN De-yan, ZHAO Hong. Data security and privacy protection issues in cloud computing[C]//2012 International Conference on Computer Science and Electronics Engineering. Hangzhou, China:IEEE, 2012, 1:647-651. |
[12] | COX L H. Suppression methodology and statistical disclosure control[J]. Journal of the American Statistical Association, 1980, 75(370):377-385. |
[13] | SWEENEY L. K-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5):557-570. |
[14] | SWEENEY L. Achieving K-anonymity privacy protection using generalization and suppression[J]. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002,10(5):571-588. |
[15] | SUN Xiao-xun, WANG Hua, LI Jiu-yong, et al. Publishing anonymous survey rating data[J]. Data Mining and Knowledge Discovery, 2011, 23(3):379-406. |
[16] | SORIACOMAS J, DOMINGOFERRER J, SANCHEZ D and MARTINEZ S. Enhancing data utility in differential privacy via microaggregation-based K-anonymity[J]. The VLDB Journal, 2014, 23(5):771-794. |
[17] | MACHANAVAJJHALA A, KIFER D, GEHRKE J. L -diversity:Privacy beyond K-anonymity[J]. ACM Transactions on Knowledge Discovery from Data, 2006, 1(1):24. |
[18] | CHEN Rui, FUNG B C M, MOHAMMED N, et al. Privacy-preserving trajectory data publishing by local suppression[J]. Information Sciences, 2011, 231(1):83-97. |
[19] | SORIACOMAS J, DOMINGOFERRER J, SANCHEZ D, et al. T-Closeness through microaggregation:Strict privacy with enhanced utility preservation[J]. IEEE Transactions on Knowledge & Data Engineering, 2015, 27(11):3098-3110. |
[20] | 夏赞珠, 韩建民, 于娟, 等. 用于实现(k,e)-匿名模型的MDAV算法[J]. 计算机工程, 2010, 36(15):159-161. XIA Zan-zhu, HAN Jian-ming,YU Juan, et al. MDAV Algorithm for implementing (k,e)-Anonymity model[J]. Computer Engineering, 2010, 36(15):159-161 |
[21] | 杨高明, 李敬兆, 杨静, 等. (k,l)-多样性数据发布研究[J]. 计算机科学, 2013, 40(8):140-145. YANG Gao-ming, LI Jing-zhao, YANG Jing, et al. Achieving(k,l)-diversity in privacy preserving data publishing[J]. Computer Science, 2013, 40(8):140-145. |
[22] | 刘向宇, 李佳佳, 安云哲, 等. 一种保持结点可达性的高效社会网络图匿名算法[J]. 软件学报, 2016, 32(8):1904-1921. LIU Xiang-yu, LI Jia-jia, AN Yun-zhe, et al. On reachability preserving graph anonymization in social networks[J]. Journal of Software, 2016, 32(8):1904-1921. |
[23] | LI Xiu-hua, MIAO Mei-xia, LIU Hai, et al. An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism[J]. Soft Computing, 2017, 21(14):3907-3917. |