Generalization step analysis for privacy preserving data publishing

被引:0
|
作者
Lv P. [1 ]
Wu Y. [2 ]
机构
[1] School of Computer Science and Engineering, Wuhan Institute of Technology, Wuhan
[2] Hubei Province Key Laboratary for Intelligent Robot, Wuhan
关键词
Advanced attack; K-anonymity model; Privacy preserving;
D O I
10.4156/jdcta.vol4.issue6.6
中图分类号
学科分类号
摘要
Data publishing generate much attention over the protection of individual privacy. In this paper, we show that it is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked when an attacker can possibly determine the privacy requirement and anonymous operations by examining the published data, or its documentation, and learn the mechanism of the anonymous algorithm. We call such an attack an advanced attack. To solve the problem, the condition of attack is analyzed, and a m-threshold model is presented to decide whether the value of quasi-identifier attribute would be continuously generalized, making use of algorithm of the GSSK(Generalization Step Safe of K-anonymity) to deal with the model. Finally, computer experiments show that the GSSK algorithm can prevent the attack with little information loss.
引用
收藏
页码:62 / 71
相关论文
共 50 条
  • [21] A general framework for privacy preserving data publishing
    Sattar, A. H. M. Sarowar
    Li, Jiuyong
    Ding, Xiaofeng
    Liu, Jixue
    Vincent, Millist
    KNOWLEDGE-BASED SYSTEMS, 2013, 54 : 276 - 287
  • [22] Privacy-Preserving Data Publishing: An Overview
    Wong, Raymond Chi-Wing
    Fu, Ada Wai-Chee
    Synthesis Lectures on Data Management, 2010, 2 (01): : 1 - 138
  • [23] Effective privacy preserving data publishing by vectorization
    Eom, Chris Soo-Hyun
    Lee, Charles Cheolgi
    Lee, Wookey
    Leung, Carson K.
    INFORMATION SCIENCES, 2020, 527 : 311 - 328
  • [24] Privacy Preserving Trajectory Data Publishing with Personalized Differential Privacy
    Wen, Ruxue
    Cheng, Wenqing
    Huang, Haojun
    Miao, Wang
    Wang, Chen
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 313 - 320
  • [25] Inference Analysis in Privacy-Preserving Data Re-publishing
    Wang, Guan
    Zhu, Zutao
    Du, Wenliang
    Teng, Zhouxuan
    ICDM 2008: EIGHTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2008, : 1079 - 1084
  • [26] PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression
    Komishani, Elahe Ghasemi
    Abadi, Mahdi
    Deldar, Fatemeh
    KNOWLEDGE-BASED SYSTEMS, 2016, 94 : 43 - 59
  • [27] Privacy Preserving Data Publishing and Data Anonymization Approaches: A Review
    Goswami, Puneet
    Madan, Suman
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 139 - 142
  • [28] DATA MINING AS A TOOL IN PRIVACY-PRESERVING DATA PUBLISHING
    Sramka, Michal
    NILCRYPT 10, 2010, 45 : 151 - 159
  • [29] Cooperative privacy game: a novel strategy for preserving privacy in data publishing
    Kumari, Valli
    Chakravarthy, Srinivasa
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2016, 6
  • [30] Personalized Privacy-Preserving Trajectory Data Publishing
    Lu Qiwei
    Wang Caimei
    Xiong Yan
    Xia Huihua
    Huang Wenchao
    Gong Xudong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 285 - 291