A practical approximation algorithm for optimal k-anonymity

被引:24
|
作者
Kenig, Batya [1 ]
Tassa, Tamir [1 ]
机构
[1] Open Univ, Div Comp Sci, Raanana, Israel
关键词
Privacy-preserving data mining; k-Anonymity; l-Diversity; Approximation algorithms for NP-hard problems; Frequent generalized itemsets; ANONYMIZATION;
D O I
10.1007/s10618-011-0235-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
k-Anonymity is a privacy preserving method for limiting disclosure of private information in data mining. The process of anonymizing a database table typically involves generalizing table entries and, consequently, it incurs loss of relevant information. This motivates the search for anonymization algorithms that achieve the required level of anonymization while incurring a minimal loss of information. The problem of k-anonymization with minimal loss of information is NP-hard. We present a practical approximation algorithm that enables solving the k-anonymization problem with an approximation guarantee of O(ln k). That algorithm improves an algorithm due to Aggarwal et al. (Proceedings of the international conference on database theory (ICDT), 2005) that offers an approximation guarantee of O(k), and generalizes that of Park and Shim (SIGMOD '07: proceedings of the 2007 ACM SIGMOD international conference on management of data, 2007) that was limited to the case of generalization by suppression. Our algorithm uses techniques that we introduce herein for mining closed frequent generalized records. Our experiments show that the significance of our algorithm is not limited only to the theory of k-anonymization. The proposed algorithm achieves lower information losses than the leading approximation algorithm, as well as the leading heuristic algorithms. A modified version of our algorithm that issues a""-diverse k-anonymizations also achieves lower information losses than the corresponding modified versions of the leading algorithms.
引用
收藏
页码:134 / 168
页数:35
相关论文
共 50 条
  • [31] Data anonymization: a novel optimal k-anonymity algorithm for identical generalization hierarchy data in IoT
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    [J]. SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2020, 14 (02) : 89 - 100
  • [32] Anatomy: Uncertain data k-anonymity privacy protection algorithm
    Ren, Xiangmin
    Jia, Boxuan
    Wang, Kechao
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1689 - +
  • [33] k-anonymity: risks and the reality
    Basu, Anirban
    Nakamura, Toru
    Hidano, Seira
    Kiyomoto, Shinsaku
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 983 - 989
  • [34] K-Anonymity for Crowdsourcing Database
    Wu, Sai
    Wang, Xiaoli
    Wang, Sheng
    Zhang, Zhenjie
    Tung, Anthony K. H.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (09) : 2207 - 2221
  • [35] k-anonymity Diagnosis Centre
    Mirakabad, Mohammad Reza Zare
    Jantan, Aman
    Bressan, Stephane
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (01): : 47 - 63
  • [36] An Improved Algorithm of Individuation K-Anonymity for Multiple Sensitive Attributes
    Lin Zhang
    Jie Xuan
    Ruoqian Si
    Ruchuan Wang
    [J]. Wireless Personal Communications, 2017, 95 : 2003 - 2020
  • [37] The k-Anonymity Problem Is Hard
    Bonizzoni, Paola
    Della Vedova, Gianluca
    Dondi, Riccardo
    [J]. FUNDAMENTALS OF COMPUTATION THEORY, PROCEEDINGS, 2009, 5699 : 26 - +
  • [38] An Improved Algorithm of Individuation K-Anonymity for Multiple Sensitive Attributes
    Zhang, Lin
    Xuan, Jie
    Si, Ruoqian
    Wang, Ruchuan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 2003 - 2020
  • [39] Algorithm for k-anonymity based on projection area density partition
    Wang, Chao
    Yang, Jing
    Zhang, Jian-Pei
    Lv, Gang
    [J]. Tongxin Xuebao/Journal on Communications, 2015, 36 (08):
  • [40] Towards Flexible K-Anonymity
    Kilany, Rima
    Sokhn, Maria
    Hellani, Hussein
    Shabani, Shaban
    [J]. KNOWLEDGE ENGINEERING AND SEMANTIC WEB, KESW 2016, 2016, 649 : 288 - 297