Cost Effective Dynamic Concept Hierarchy Generation for Preserving Privacy

被引:2
|
作者
Vatsavayi, Valli [1 ]
Adusumalli, Sri [1 ]
机构
[1] Andhra Univ, Dept Comp Sci & Syst Engn, Visakhapatnam 530003, Andhra Pradesh, India
关键词
Data privacy; data anonymization; concept hierarchy tree (CHT); dynamic concept hierarchy tree (DCHT); information loss;
D O I
10.1142/S021964921450035X
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Explosive growth of information in the Internet has raised threats for individual privacy. k-Anonymity and l-diversity are two known techniques proposed to address the threats. They use concept hierarchy tree (CHT)-based generalization/suppression. For a given attribute several CHTs can be constructed. An appropriate CHT is to be chosen for attribute anonymization to be effective. This paper discusses an on the fly approach for constructing CHT which can be used for generalization/suppression. Furthermore to improve anonymization the CHT can be dynamically adjusted for a given k value. Performance evaluation is done for the proposed approach and a comparative study is performed against known methods, k-member clustering anonymization and mondrian multi-dimensional algorithm using (1) improved on the fly hierarchy (IOTF) (Campan et al., 2011), (2) on the fly hierarchy (OTF) (Campan and Cooper, 2010), (3) hierarchy free (HF) (LeFevre et al., 2006), (4) predefined hierarchy (PH) (Iyengar, 2002) (5) CHU (Chu and Chiang, 1994) and (6) HAN (Han and Fu, 1994) methods. The metrics used for evaluation are (a) information loss, (b) discernibility metric, (c) normalized average equivalence size metric. Experimental results indicate that our approach is more effective and flexible and the utility is 12% better than IOTF, 16% better than OTF and CHU, 17% better than PH and 21% better than HAN methods when applied on mondrain multi-dimensional algorithm. Experiments are conducted on k-member clustering technique and it is observed that our approach improved utility 1% better than IOTF, 2% better than OTF, 3% better than CHU, 5% better than PH and 14% better than HAN methods.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Privacy-preserving alert correlation: A concept hierarchy based approach
    Xu, DB
    Ning, P
    21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 489 - 498
  • [2] Privacy Preserving Distributed Association Rule Hiding Using Concept Hierarchy
    Modak, Masooda
    Shaikhb, Rizwana
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 993 - 1000
  • [3] Privacy Preserving in Ubiquitous Computing: Classification & Hierarchy
    Ma, Tinghuai
    Yan, Sen
    Wang, Jin
    Lee, Sungyoung
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) : 1185 - 1206
  • [4] Cost-effective privacy-preserving vehicular urban sensing system
    Zuo, Cong
    Liang, Kaitai
    Jiang, Zoe L.
    Shao, Jun
    Fang, Junbin
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 893 - 901
  • [5] Cost-effective privacy-preserving vehicular urban sensing system
    Cong Zuo
    Kaitai Liang
    Zoe L. Jiang
    Jun Shao
    Junbin Fang
    Personal and Ubiquitous Computing, 2017, 21 : 893 - 901
  • [6] Cost-Effective and Privacy-Preserving Energy Management for Smart Meters
    Yang, Lei
    Chen, Xu
    Zhang, Junshan
    Poor, H. Vincent
    IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (01) : 486 - 495
  • [7] MinHash Hierarchy for Privacy Preserving Trajectory Sensing and Query
    Ding, Jiaxin
    Ni, Chien-Chun
    Zhou, Mengyu
    Gao, Jie
    2017 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN), 2017, : 17 - 28
  • [8] Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations
    Luo, Wu
    Liu, Wei
    Luo, Yang
    Ruan, Anbang
    Shen, Qingni
    Wu, Zhonghai
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 152 - 159
  • [9] Preserving privacy through data generation
    Vreeken, Jilles
    van Leeuwen, Matthijs
    Siebes, Arno
    ICDM 2007: PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2007, : 685 - 690
  • [10] Privacy Preserving in Dynamic Social Networks
    Jyothi, Vadisala
    Kumari, V. Valli
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,