Cost Effective Dynamic Concept Hierarchy Generation for Preserving Privacy

被引:2
|
作者
Vatsavayi, Valli [1 ]
Adusumalli, Sri [1 ]
机构
[1] Andhra Univ, Dept Comp Sci & Syst Engn, Visakhapatnam 530003, Andhra Pradesh, India
关键词
Data privacy; data anonymization; concept hierarchy tree (CHT); dynamic concept hierarchy tree (DCHT); information loss;
D O I
10.1142/S021964921450035X
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Explosive growth of information in the Internet has raised threats for individual privacy. k-Anonymity and l-diversity are two known techniques proposed to address the threats. They use concept hierarchy tree (CHT)-based generalization/suppression. For a given attribute several CHTs can be constructed. An appropriate CHT is to be chosen for attribute anonymization to be effective. This paper discusses an on the fly approach for constructing CHT which can be used for generalization/suppression. Furthermore to improve anonymization the CHT can be dynamically adjusted for a given k value. Performance evaluation is done for the proposed approach and a comparative study is performed against known methods, k-member clustering anonymization and mondrian multi-dimensional algorithm using (1) improved on the fly hierarchy (IOTF) (Campan et al., 2011), (2) on the fly hierarchy (OTF) (Campan and Cooper, 2010), (3) hierarchy free (HF) (LeFevre et al., 2006), (4) predefined hierarchy (PH) (Iyengar, 2002) (5) CHU (Chu and Chiang, 1994) and (6) HAN (Han and Fu, 1994) methods. The metrics used for evaluation are (a) information loss, (b) discernibility metric, (c) normalized average equivalence size metric. Experimental results indicate that our approach is more effective and flexible and the utility is 12% better than IOTF, 16% better than OTF and CHU, 17% better than PH and 21% better than HAN methods when applied on mondrain multi-dimensional algorithm. Experiments are conducted on k-member clustering technique and it is observed that our approach improved utility 1% better than IOTF, 2% better than OTF, 3% better than CHU, 5% better than PH and 14% better than HAN methods.
引用
收藏
页数:19
相关论文
共 50 条
  • [11] Effective privacy preserving data publishing by vectorization
    Eom, Chris Soo-Hyun
    Lee, Charles Cheolgi
    Lee, Wookey
    Leung, Carson K.
    INFORMATION SCIENCES, 2020, 527 : 311 - 328
  • [12] Privacy Preserving Key Generation for Iris Biometrics
    Rathgeb, Christian
    Uhl, Andreas
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 191 - 200
  • [13] Adversarial Mask Generation for Preserving Visual Privacy
    Gupta, Aayush
    Jaiswal, Ayush
    Wu, Yue
    Yadav, Vivek
    Natarajan, Pradeep
    2021 16TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2021), 2021,
  • [14] Online Macro Generation for Privacy Preserving Planning
    Maliah, Shlomi
    Shani, Guy
    Brafman, Ronen I.
    TWENTY-SIXTH INTERNATIONAL CONFERENCE ON AUTOMATED PLANNING AND SCHEDULING (ICAPS 2016), 2016, : 216 - 220
  • [15] A Graph Generation Network with Privacy Preserving Capabilities
    Miao, Yangyong
    Wang, Xiaoding
    Lin, Hui
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT VII, 2024, 14493 : 67 - 79
  • [16] Privacy Preserving Dynamic Room Layout Mapping
    Li, Xinyu
    Zhang, Yanyi
    Marsic, Ivan
    Burd, Randall S.
    IMAGE AND SIGNAL PROCESSING (ICISP 2016), 2016, 9680 : 61 - 70
  • [17] Design of Privacy-Preserving Dynamic Controllers
    Kawano, Yu
    Cao, Ming
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3863 - 3878
  • [18] A Cost-Effective Approach towards Storage and Privacy Preserving for Intermediate Data Sets in Cloud Environment
    Ramachandran, Sumalatha
    Chithan, Selvakumar
    Ravindran, Siddharth
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [19] A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
    Zhang, Xuyun
    Liu, Chang
    Nepal, Surya
    Pandey, Suraj
    Chen, Jinjun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (06) : 1192 - 1202
  • [20] An effective method for privacy preserving association rule mining
    Zhang, Peng
    Tong, Yun-Hai
    Tang, Shi-Wei
    Yang, Dong-Qing
    Ma, Xiu-Li
    Ruan Jian Xue Bao/Journal of Software, 2006, 17 (08): : 1764 - 1774