A practical approximation algorithm for optimal k-anonymity

被引:24
|
作者
Kenig, Batya [1 ]
Tassa, Tamir [1 ]
机构
[1] Open Univ, Div Comp Sci, Raanana, Israel
关键词
Privacy-preserving data mining; k-Anonymity; l-Diversity; Approximation algorithms for NP-hard problems; Frequent generalized itemsets; ANONYMIZATION;
D O I
10.1007/s10618-011-0235-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
k-Anonymity is a privacy preserving method for limiting disclosure of private information in data mining. The process of anonymizing a database table typically involves generalizing table entries and, consequently, it incurs loss of relevant information. This motivates the search for anonymization algorithms that achieve the required level of anonymization while incurring a minimal loss of information. The problem of k-anonymization with minimal loss of information is NP-hard. We present a practical approximation algorithm that enables solving the k-anonymization problem with an approximation guarantee of O(ln k). That algorithm improves an algorithm due to Aggarwal et al. (Proceedings of the international conference on database theory (ICDT), 2005) that offers an approximation guarantee of O(k), and generalizes that of Park and Shim (SIGMOD '07: proceedings of the 2007 ACM SIGMOD international conference on management of data, 2007) that was limited to the case of generalization by suppression. Our algorithm uses techniques that we introduce herein for mining closed frequent generalized records. Our experiments show that the significance of our algorithm is not limited only to the theory of k-anonymization. The proposed algorithm achieves lower information losses than the leading approximation algorithm, as well as the leading heuristic algorithms. A modified version of our algorithm that issues a""-diverse k-anonymizations also achieves lower information losses than the corresponding modified versions of the leading algorithms.
引用
收藏
页码:134 / 168
页数:35
相关论文
共 50 条
  • [1] A practical approximation algorithm for optimal k-anonymity
    Batya Kenig
    Tamir Tassa
    [J]. Data Mining and Knowledge Discovery, 2012, 25 : 134 - 168
  • [2] An Improved Algorithm for K-anonymity
    Zhang, Jing
    Gong, Xiujun
    Han, Zhipeng
    Feng, Siling
    [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 352 - +
  • [3] On the optimal selection of k in the k-anonymity problem
    Dewri, Rinku
    Ray, Indrajit
    Ray, Indrakshi
    Whitley, Darrell
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 1364 - +
  • [4] Flash: Efficient, Stable and Optimal K-Anonymity
    Kohlmayer, Florian
    Prasser, Fabian
    Eckert, Claudia
    Kemper, Alfons
    Kuhn, Klaus A.
    [J]. PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 708 - 717
  • [5] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    [J]. World Wide Web, 2021, 24 : 1551 - 1561
  • [6] K-Anonymity Algorithm Based on Improved Clustering
    Zheng, Wantong
    Wang, Zhongyue
    Lv, Tongtong
    Ma, Yong
    Jia, Chunfu
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT II, 2018, 11335 : 462 - 476
  • [7] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [8] Reciprocal Cloaking Algorithm for Spatial K-Anonymity
    侯士江
    刘国华
    [J]. Journal of Donghua University(English Edition), 2013, 30 (01) : 49 - 53
  • [9] Data privacy preservation algorithm with k-anonymity
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05): : 1551 - 1561
  • [10] A General Algorithm for k-anonymity on Dynamic Databases
    Salas, Julian
    Torra, Vicenc
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2018, 11025 : 407 - 414