Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions

被引:5
|
作者
Qian, Jin [1 ,3 ]
Jiang, Haoying [1 ]
Yu, Ying [1 ]
Wang, Hui [1 ]
Miao, Duoqian [1 ,2 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
[2] Tongji Univ, Dept Comp Sci & Technol, Shanghai 201804, Peoples R China
[3] Jiangsu Univ Sci & Technol, Sch Comp, Zhenjiang 212003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Decision-theoretic rough set; Sequential three-way decisions; K-anonymity; Personalized anonymity; Privacy preservation; ROUGH SETS;
D O I
10.1016/j.eswa.2023.122343
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
K-anonymity is a widely used privacy-preserving technique which defends against linking attacks by suppres-sion and generalization. The existing k-anonymity algorithms prevent attackers from illegally obtaining private information by constraining at least k records in an equivalence group. However, this unified anonymity method ignores individual differences and leads to a large amount of information loss. To this end, we introduce sequential three-way decisions into k-anonymity, using a dynamic k-value sequence instead of the fixed k-value to achieve personalized k-anonymity. Specifically, we first construct a hierarchical decision table for k-anonymity by attribute generalization trees and sensitive decision values provided with users. Then, we propose a multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions, where we anonymize the partitioning granular data with a dynamic k-value sequence, respectively. Furthermore, we present three practical algorithms to implement the proposed model and discuss the differences between them. Finally, the experimental results demonstrate that the proposed model not only provides a more flexible anonymization method to achieve personalized anonymity, but greatly reduces the information loss. This study provides a complete framework for multi-level privacy protection and enriches the application of sequential three-way decisions.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions
    Qian, Jin
    Jiang, Haoying
    Yu, Ying
    Wang, Hui
    Miao, Duoqian
    Expert Systems with Applications, 2024, 239
  • [2] Multi-Level Privacy Preserving K-Anonymity
    Weng, Jui-Hung
    Chi, Po-Wen
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 61 - 67
  • [3] A dynamic anonymization privacy-preserving model based on hierarchical sequential three-way decisions
    Qian, Jin
    Zheng, Mingchen
    Yu, Ying
    Zhou, Chuanpeng
    Miao, Duoqian
    INFORMATION SCIENCES, 2025, 686
  • [4] Privacy-preserving distributed k-anonymity
    Jiang, W
    Clifton, C
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 166 - 177
  • [5] A personalized k-anonymity privacy preserving method
    Xu, Yong
    Qin, Xiaolin
    Yang, Zhongxue
    Yang, Yitao
    Li, Kun
    Journal of Information and Computational Science, 2013, 10 (01): : 139 - 155
  • [6] A Privacy-preserving Computation Offloading Method Based on k-Anonymity
    Zhao Xing
    Peng Jianhua
    You Wei
    Chen Lu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (04) : 892 - 899
  • [7] (k, ε, δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
    Tsou, Yao-Tung
    Alraja, Mansour Naser
    Chen, Li-Sheng
    Chang, Yu-Hsiang
    Hu, Yung-Li
    Huang, Yennun
    Yu, Chia-Mu
    Tsai, Pei-Yuan
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (03) : 175 - 185
  • [8] K-Anonymity Based Approach For Privacy-Preserving Web Service Selection
    Ammar, Nariman
    Malik, Zaki
    Medjahed, Brahim
    Alodib, Mohammed
    2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, : 281 - 288
  • [9] Trajectory Privacy-Preserving Approach for Consecutive Queries Based on K-Anonymity
    Zhu, Lin
    FUZZY SYSTEMS AND DATA MINING III (FSDM 2017), 2017, 299 : 416 - 421
  • [10] A three-way trajectory privacy-preserving model based on multi-feature fusion
    Xu, Jianfeng
    Wei, Yiping
    Chen, Yingxiao
    APPLIED SOFT COMPUTING, 2024, 158