Generalization step analysis for privacy preserving data publishing

被引:0
|
作者
Lv P. [1 ]
Wu Y. [2 ]
机构
[1] School of Computer Science and Engineering, Wuhan Institute of Technology, Wuhan
[2] Hubei Province Key Laboratary for Intelligent Robot, Wuhan
关键词
Advanced attack; K-anonymity model; Privacy preserving;
D O I
10.4156/jdcta.vol4.issue6.6
中图分类号
学科分类号
摘要
Data publishing generate much attention over the protection of individual privacy. In this paper, we show that it is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked when an attacker can possibly determine the privacy requirement and anonymous operations by examining the published data, or its documentation, and learn the mechanism of the anonymous algorithm. We call such an attack an advanced attack. To solve the problem, the condition of attack is analyzed, and a m-threshold model is presented to decide whether the value of quasi-identifier attribute would be continuously generalized, making use of algorithm of the GSSK(Generalization Step Safe of K-anonymity) to deal with the model. Finally, computer experiments show that the GSSK algorithm can prevent the attack with little information loss.
引用
收藏
页码:62 / 71
相关论文
共 50 条
  • [1] A Survey of Privacy Preserving Data Publishing using Generalization and Suppression
    Xu, Yang
    Ma, Tinghuai
    Tang, Meili
    Tian, Wei
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1103 - 1116
  • [2] Utility-Friendly Heterogenous Generalization in Privacy Preserving Data Publishing
    He, Xianmang
    Li, Dong
    Hao, Yanni
    Chen, Huahui
    CONCEPTUAL MODELING, 2014, 8824 : 186 - 194
  • [3] Multi-Attribute Generalization Method in Privacy Preserving Data Publishing
    Yu Wen-bing
    Pin, L. V.
    Chen Nian-sheng
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 319 - 322
  • [4] vA SLICING WITH GENERALIZATION TECHNIQUES USED FOR PRIVACY PRESERVING DATA PUBLISHING
    Kumar, B. Santhosh
    Karthik, S.
    Arunachalam, V. P.
    IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORK SECURITY (ICSNS 2018), 2018, : 322 - 328
  • [5] GN: A Privacy Preserving Data Publishing Method Based on Generalization and Noise Techniques
    Ma, Yeling
    Wang, Jiyi
    Han, Jianmin
    Wang, Lixia
    2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 219 - 224
  • [6] Privacy-preserving data publishing for cluster analysis
    Fung, Benjamin C. M.
    Wang, Ke
    Wang, Lingyu
    Hung, Patrick C. K.
    DATA & KNOWLEDGE ENGINEERING, 2009, 68 (06) : 552 - 575
  • [7] Privacy-Preserving Data Publishing
    Liu, Ruilin
    Wang, Hui
    2010 IEEE 26TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDE 2010), 2010, : 305 - 308
  • [8] Privacy Preserving Big Data Publishing
    Canbay, Yavuz
    Vural, Yilmaz
    Sagiroglu, Seref
    2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), 2018, : 24 - 29
  • [9] Privacy preserving in sequential data publishing
    Hossain, Md. Muktar
    Islam, Md. Rabiul
    2021 International Conference on Automation, Control and Mechatronics for Industry 4.0, ACMI 2021, 2021,
  • [10] Privacy-Preserving Data Publishing
    Chen, Bee-Chung
    Kifer, Daniel
    LeFevre, Kristen
    Machanavajjhala, Ashwin
    FOUNDATIONS AND TRENDS IN DATABASES, 2009, 2 (1-2): : 1 - 167