Generalization step analysis for privacy preserving data publishing

被引:0
|
作者
Lv P. [1 ]
Wu Y. [2 ]
机构
[1] School of Computer Science and Engineering, Wuhan Institute of Technology, Wuhan
[2] Hubei Province Key Laboratary for Intelligent Robot, Wuhan
关键词
Advanced attack; K-anonymity model; Privacy preserving;
D O I
10.4156/jdcta.vol4.issue6.6
中图分类号
学科分类号
摘要
Data publishing generate much attention over the protection of individual privacy. In this paper, we show that it is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked when an attacker can possibly determine the privacy requirement and anonymous operations by examining the published data, or its documentation, and learn the mechanism of the anonymous algorithm. We call such an attack an advanced attack. To solve the problem, the condition of attack is analyzed, and a m-threshold model is presented to decide whether the value of quasi-identifier attribute would be continuously generalized, making use of algorithm of the GSSK(Generalization Step Safe of K-anonymity) to deal with the model. Finally, computer experiments show that the GSSK algorithm can prevent the attack with little information loss.
引用
收藏
页码:62 / 71
相关论文
共 50 条
  • [41] Towards Privacy-Preserving Speech Data Publishing
    Qian, Jianwei
    Han, Feng
    Hou, Jiahui
    Zhang, Chunhong
    Wang, Yu
    Li, Xiang-Yang
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1088 - 1096
  • [42] Study on Privacy Preserving Technology in Data Publishing Scenario
    Xu Yong
    Zhou Shanying
    Sun Yutao
    PROGRESS IN CIVIL ENGINEERING, PTS 1-4, 2012, 170-173 : 3658 - 3661
  • [43] A systematic review on privacy preserving data publishing techniques
    Churi P.P.
    Pawar A.V.
    Journal of Engineering Science and Technology Review, 2019, 12 (06) : 17 - 25
  • [44] Privacy Preserving Anonymity for Periodical SRS Data Publishing
    Wang, Jie-Teng
    Lin, Wen-Yang
    2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 1344 - 1355
  • [45] Personalized privacy preserving algorithm for trajectory data publishing
    Wu, Ying-Jie, 1600, Chinese Institute of Electronics (36):
  • [46] Privacy-Preserving Data Publishing in Process Mining
    Rafiei, Majid
    van der Aalst, Wil M. P.
    BUSINESS PROCESS MANAGEMENT FORUM, BPM FORUM 2020, 2020, 392 : 122 - 138
  • [47] Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing
    Ninggal, Mohd Izuan Hafez
    Abawajy, Jemal
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 847 - 852
  • [48] An Improved Data Sanitization Algorithm for Privacy Preserving Medical Data Publishing
    Zaman, A. N. K.
    Obimbo, Charlie
    Dara, Rozita A.
    ADVANCES IN ARTIFICIAL INTELLIGENCE, CANADIAN AI 2017, 2017, 10233 : 64 - 70
  • [49] Privacy, space, and time: a survey on privacy-preserving continuous data publishing
    Katsomallos, Manos
    Tzompanaki, Katerina
    Kotzinos, Dimitris
    JOURNAL OF SPATIAL INFORMATION SCIENCE, 2019, (19): : 57 - 103
  • [50] Privacy-Preserving Publishing Data with Full Functional Dependencies
    Wang, Hui
    Liu, Ruilin
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT II, PROCEEDINGS, 2010, 5982 : 176 - 183