Cost Effective Dynamic Concept Hierarchy Generation for Preserving Privacy

被引:2
|
作者
Vatsavayi, Valli [1 ]
Adusumalli, Sri [1 ]
机构
[1] Andhra Univ, Dept Comp Sci & Syst Engn, Visakhapatnam 530003, Andhra Pradesh, India
关键词
Data privacy; data anonymization; concept hierarchy tree (CHT); dynamic concept hierarchy tree (DCHT); information loss;
D O I
10.1142/S021964921450035X
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Explosive growth of information in the Internet has raised threats for individual privacy. k-Anonymity and l-diversity are two known techniques proposed to address the threats. They use concept hierarchy tree (CHT)-based generalization/suppression. For a given attribute several CHTs can be constructed. An appropriate CHT is to be chosen for attribute anonymization to be effective. This paper discusses an on the fly approach for constructing CHT which can be used for generalization/suppression. Furthermore to improve anonymization the CHT can be dynamically adjusted for a given k value. Performance evaluation is done for the proposed approach and a comparative study is performed against known methods, k-member clustering anonymization and mondrian multi-dimensional algorithm using (1) improved on the fly hierarchy (IOTF) (Campan et al., 2011), (2) on the fly hierarchy (OTF) (Campan and Cooper, 2010), (3) hierarchy free (HF) (LeFevre et al., 2006), (4) predefined hierarchy (PH) (Iyengar, 2002) (5) CHU (Chu and Chiang, 1994) and (6) HAN (Han and Fu, 1994) methods. The metrics used for evaluation are (a) information loss, (b) discernibility metric, (c) normalized average equivalence size metric. Experimental results indicate that our approach is more effective and flexible and the utility is 12% better than IOTF, 16% better than OTF and CHU, 17% better than PH and 21% better than HAN methods when applied on mondrain multi-dimensional algorithm. Experiments are conducted on k-member clustering technique and it is observed that our approach improved utility 1% better than IOTF, 2% better than OTF, 3% better than CHU, 5% better than PH and 14% better than HAN methods.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Privacy-Preserving Cost-Sensitive Learning
    Yang, Yi
    Huang, Shuai
    Huang, Wei
    Chang, Xiangyu
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 32 (05) : 2105 - 2116
  • [22] Privacy-preserving identity federations in the cloud: A proof of concept
    Dos Santos, D.R. (danielrs@inf.ufsc.br), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (09):
  • [23] Privacy-Preserving Synthetic Educational Data Generation
    Vie, Jill-Jenn
    Rigaux, Tomas
    Minn, Sein
    EDUCATING FOR A NEW FUTURE: MAKING SENSE OF TECHNOLOGY-ENHANCED LEARNING ADOPTION, EC-TEL 2022, 2022, 13450 : 393 - 406
  • [24] Federated TimeGAN for Privacy Preserving Synthetic Trajectory Generation
    Bouabba, Saloua
    Zeitouni, Karine
    Haidar, Bassem
    Agoulmine, Nazim
    Dagdia, Zaineb Chelly
    PROCEEDINGS OF THE 2024 25TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, MDM 2024, 2024, : 301 - 306
  • [25] PRIVACY PRESERVING RSS MAP GENERATION FOR A CROWDSENSING NETWORK
    Wu, Xuangou
    Yang, Panlong
    Tang, Shaojie
    Zheng, Xiao
    Xiong, Yan
    IEEE WIRELESS COMMUNICATIONS, 2015, 22 (04) : 42 - 48
  • [26] Generation and evaluation of privacy preserving synthetic health data
    Yale, Andrew
    Dash, Saloni
    Dutta, Ritik
    Guyon, Isabelle
    Pavao, Adrien
    Bennett, Kristin P.
    NEUROCOMPUTING, 2020, 416 : 244 - 255
  • [27] Privacy preserving database generation for database application testing
    Wu, Xintao
    Wang, Yongge
    Guo, Songtao
    Zheng, Yuliang
    FUNDAMENTA INFORMATICAE, 2007, 78 (04) : 595 - 612
  • [28] Statistical database modeling for privacy preserving database generation
    Wu, XT
    Wang, YG
    Zheng, YL
    FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, 3488 : 382 - 390
  • [29] Privacy-Preserving Recommender Systems in Dynamic Environments
    Erkin, Z.
    Veugen, T.
    Lagendijk, R. L.
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 61 - 66
  • [30] XML privacy preserving model based on dynamic context
    Wang M.
    Huang S.
    Zheng C.
    Li H.
    International Journal of Performability Engineering, 2018, 14 (12) : 3206 - 3219