Cost Effective Dynamic Concept Hierarchy Generation for Preserving Privacy

被引:2
|
作者
Vatsavayi, Valli [1 ]
Adusumalli, Sri [1 ]
机构
[1] Andhra Univ, Dept Comp Sci & Syst Engn, Visakhapatnam 530003, Andhra Pradesh, India
关键词
Data privacy; data anonymization; concept hierarchy tree (CHT); dynamic concept hierarchy tree (DCHT); information loss;
D O I
10.1142/S021964921450035X
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Explosive growth of information in the Internet has raised threats for individual privacy. k-Anonymity and l-diversity are two known techniques proposed to address the threats. They use concept hierarchy tree (CHT)-based generalization/suppression. For a given attribute several CHTs can be constructed. An appropriate CHT is to be chosen for attribute anonymization to be effective. This paper discusses an on the fly approach for constructing CHT which can be used for generalization/suppression. Furthermore to improve anonymization the CHT can be dynamically adjusted for a given k value. Performance evaluation is done for the proposed approach and a comparative study is performed against known methods, k-member clustering anonymization and mondrian multi-dimensional algorithm using (1) improved on the fly hierarchy (IOTF) (Campan et al., 2011), (2) on the fly hierarchy (OTF) (Campan and Cooper, 2010), (3) hierarchy free (HF) (LeFevre et al., 2006), (4) predefined hierarchy (PH) (Iyengar, 2002) (5) CHU (Chu and Chiang, 1994) and (6) HAN (Han and Fu, 1994) methods. The metrics used for evaluation are (a) information loss, (b) discernibility metric, (c) normalized average equivalence size metric. Experimental results indicate that our approach is more effective and flexible and the utility is 12% better than IOTF, 16% better than OTF and CHU, 17% better than PH and 21% better than HAN methods when applied on mondrain multi-dimensional algorithm. Experiments are conducted on k-member clustering technique and it is observed that our approach improved utility 1% better than IOTF, 2% better than OTF, 3% better than CHU, 5% better than PH and 14% better than HAN methods.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] The cost of preserving privacy: Performance measurements of RFID pseudonym protocols
    Mache, Jens
    Allick, Chris
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 606 - +
  • [42] CHANGE OF THE COST-EFFECTIVE NETWORK HIERARCHY.
    Lajtha, Gy.
    Borsos, K.
    Sallai, Gy.
    Papp, Z.
    World Telecommunication Forum, (Proceedings), 1979, (Pt 2): : 1 - 3
  • [43] Privacy-preserving cost-effective work distribution with fine-grained access control for mobile crowdsensing
    Chaudhari P.
    International Journal of Security and Networks, 2023, 18 (02) : 106 - 116
  • [44] Privacy preserving data generation for database application performance testing
    Wang, YG
    Wu, XT
    Zheng, YL
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 142 - 151
  • [45] A Privacy Preserving Protocol for Generation the Common Tangent of Two Circles
    Fu Zufeng
    Wang Haiying
    2014 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC), VOL 1, 2014, : 227 - 231
  • [46] Mining multilevel association rules with dynamic concept hierarchy
    Wan, Yin-Bo
    Liang, Yong
    Ding, Li-Ya
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 287 - 292
  • [47] Privacy-preserving data releases for health report generation
    Boyens, C
    Krishnan, R
    Padman, R
    MEDINFO 2004: PROCEEDINGS OF THE 11TH WORLD CONGRESS ON MEDICAL INFORMATICS, PT 1 AND 2, 2004, 107 : 1268 - 1272
  • [48] Privacy preserving database access through dynamic privacy filters with stable data Randomization
    Ong, Han-Yuen
    Miri, Ali
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 3574 - 3579
  • [49] Privacy-Preserving Synthetic Data Generation for Recommendation Systems
    Liu, Fan
    Cheng, Zhiyong
    Chen, Huilin
    Wei, Yinwei
    Nie, Liqiang
    Kankanhalli, Mohan
    PROCEEDINGS OF THE 45TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR '22), 2022, : 1379 - 1389
  • [50] Dynamic Privacy-preserving Collaborative Schemes for Average Computation
    Wang, Xin
    Ishii, Hideaki
    He, Jianping
    Cheng, Peng
    IFAC PAPERSONLINE, 2020, 53 (02): : 2963 - 2968