A practical approximation algorithm for optimal k-anonymity

被引:24
|
作者
Kenig, Batya [1 ]
Tassa, Tamir [1 ]
机构
[1] Open Univ, Div Comp Sci, Raanana, Israel
关键词
Privacy-preserving data mining; k-Anonymity; l-Diversity; Approximation algorithms for NP-hard problems; Frequent generalized itemsets; ANONYMIZATION;
D O I
10.1007/s10618-011-0235-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
k-Anonymity is a privacy preserving method for limiting disclosure of private information in data mining. The process of anonymizing a database table typically involves generalizing table entries and, consequently, it incurs loss of relevant information. This motivates the search for anonymization algorithms that achieve the required level of anonymization while incurring a minimal loss of information. The problem of k-anonymization with minimal loss of information is NP-hard. We present a practical approximation algorithm that enables solving the k-anonymization problem with an approximation guarantee of O(ln k). That algorithm improves an algorithm due to Aggarwal et al. (Proceedings of the international conference on database theory (ICDT), 2005) that offers an approximation guarantee of O(k), and generalizes that of Park and Shim (SIGMOD '07: proceedings of the 2007 ACM SIGMOD international conference on management of data, 2007) that was limited to the case of generalization by suppression. Our algorithm uses techniques that we introduce herein for mining closed frequent generalized records. Our experiments show that the significance of our algorithm is not limited only to the theory of k-anonymization. The proposed algorithm achieves lower information losses than the leading approximation algorithm, as well as the leading heuristic algorithms. A modified version of our algorithm that issues a""-diverse k-anonymizations also achieves lower information losses than the corresponding modified versions of the leading algorithms.
引用
收藏
页码:134 / 168
页数:35
相关论文
共 50 条
  • [21] A FAST AND STABLE CLUSTERING ALGORITHM FOR K-ANONYMITY MODEL
    Chen, Tung-Shou
    Chen, Jeanne
    Chen, Chung-Kuang
    Kao, Yuan-Hung
    [J]. 2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 275 - 279
  • [22] A K-anonymity Clustering Algorithm Based on the Information Entropy
    Zhang, Jianpei
    Zhao, Ying
    Yang, Yue
    Yang, Jing
    [J]. PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2014, : 319 - 324
  • [23] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [24] k-Presence-Secrecy: Practical Privacy Model as Extension of k-Anonymity
    Yamaoka, Yuji
    Itoh, Kouichi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (04): : 730 - 740
  • [25] Data anonymization: a novel optimal k-anonymity algorithm for identical generalization hierarchy data in IoT
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    [J]. Service Oriented Computing and Applications, 2020, 14 : 89 - 100
  • [26] Data anonymization: a novel optimal k-anonymity algorithm for identical generalization hierarchy data in IoT
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    [J]. SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2020, 14 (02) : 89 - 100
  • [27] Anatomy: Uncertain data k-anonymity privacy protection algorithm
    Ren, Xiangmin
    Jia, Boxuan
    Wang, Kechao
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1689 - +
  • [28] An improved weighted-feature clustering algorithm for k-anonymity
    Lu, Lijian
    Ye, Xiaojun
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 415 - 418
  • [29] k-anonymity: risks and the reality
    Basu, Anirban
    Nakamura, Toru
    Hidano, Seira
    Kiyomoto, Shinsaku
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 983 - 989
  • [30] k-anonymity Diagnosis Centre
    Mirakabad, Mohammad Reza Zare
    Jantan, Aman
    Bressan, Stephane
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (01): : 47 - 63