Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions

被引:5
|
作者
Qian, Jin [1 ,3 ]
Jiang, Haoying [1 ]
Yu, Ying [1 ]
Wang, Hui [1 ]
Miao, Duoqian [1 ,2 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
[2] Tongji Univ, Dept Comp Sci & Technol, Shanghai 201804, Peoples R China
[3] Jiangsu Univ Sci & Technol, Sch Comp, Zhenjiang 212003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Decision-theoretic rough set; Sequential three-way decisions; K-anonymity; Personalized anonymity; Privacy preservation; ROUGH SETS;
D O I
10.1016/j.eswa.2023.122343
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
K-anonymity is a widely used privacy-preserving technique which defends against linking attacks by suppres-sion and generalization. The existing k-anonymity algorithms prevent attackers from illegally obtaining private information by constraining at least k records in an equivalence group. However, this unified anonymity method ignores individual differences and leads to a large amount of information loss. To this end, we introduce sequential three-way decisions into k-anonymity, using a dynamic k-value sequence instead of the fixed k-value to achieve personalized k-anonymity. Specifically, we first construct a hierarchical decision table for k-anonymity by attribute generalization trees and sensitive decision values provided with users. Then, we propose a multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions, where we anonymize the partitioning granular data with a dynamic k-value sequence, respectively. Furthermore, we present three practical algorithms to implement the proposed model and discuss the differences between them. Finally, the experimental results demonstrate that the proposed model not only provides a more flexible anonymization method to achieve personalized anonymity, but greatly reduces the information loss. This study provides a complete framework for multi-level privacy protection and enriches the application of sequential three-way decisions.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET
    Akhter, A. F. M. Suaib
    Ahmed, Mohiuddin
    Shah, A. F. M. Shahen
    Anwar, Adnan
    Zengin, Ahmet
    SUSTAINABILITY, 2021, 13 (01) : 1 - 25
  • [32] A multi-level privacy-preserving scheme for extracting traffic images
    He, Xiaofei
    Li, Lixiang
    Peng, Haipeng
    Tong, Fenghua
    SIGNAL PROCESSING, 2024, 220
  • [33] A privacy-preserving scheme with multi-level regulation compliance for blockchain
    Jia, Wangjing
    Xie, Tao
    Wang, Baolai
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [34] Hierarchical Multi-granulation Sequential Three-Way Decisions
    Hong, Chengxin
    Qian, Jin
    Jiang, Haoying
    Tong, Zhigang
    Yu, Ying
    Liu, Caihui
    ROUGH SETS, IJCRS 2022, 2022, 13633 : 334 - 345
  • [35] Sequential three-way decisions via multi-granularity
    Qian, Jin
    Liu, Caihui
    Miao, Duoqian
    Yue, Xiaodong
    INFORMATION SCIENCES, 2020, 507 : 606 - 629
  • [36] A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
    B. Sowmiya
    E. Poovammal
    Wireless Personal Communications, 2022, 127 : 1359 - 1376
  • [37] k-anonymity based framework for privacy preserving data collection in wireless sensor networks
    Bahsi, Hayretdin
    Levi, Albert
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2010, 18 (02) : 241 - 271
  • [38] A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
    Sowmiya, B.
    Poovammal, E.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1359 - 1376
  • [39] LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme
    Chen, Ming
    Li, Wenzhong
    Chen, Xu
    Li, Zhuo
    Lu, Sanglu
    Chen, Daoxu
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [40] A K-anonymity Based Semantic Model For Protecting Personal Information and Privacy
    Omran, Esraa
    Bokma, Albert
    Abu-Almaati, Shereef
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1443 - +