Probabilistic optimal projection partition KD-Tree k-anonymity for data publishing privacy protection

被引:3
|
作者
Wang, Xiaohan [1 ,2 ]
Luo, Yonglong [1 ,2 ]
Jiang, Yefeng [2 ]
Wu, Wenli [2 ]
Yu, Qingying [1 ,2 ]
机构
[1] Anhui Normal Univ, Sch Geog & Tourism, Wuhu 241003, Anhui, Peoples R China
[2] Anhui Normal Univ, Anhui Prov Key Lab Network & Informat Secur, Wuhu 241003, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Data publishing; privacy protection; k-anonymity; KD-tree; probabilistic partitioning; PRESERVING PRIVACY; ANONYMIZATION; UTILITY;
D O I
10.3233/IDA-173589
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data needs to be released to the relevant decision makers and researchers. Privacy protection should be carried out first because it contains personal sensitive information. The k-anonymity algorithm is an important privacy protection algorithm, and partitioning is one of its key methods. To reduce the computational complexity and low speed of existing privacy-preserving algorithms for high-dimensional data publishing, a probabilistic optimal projection partition k-dimensional (KD)-tree k-anonymity algorithm is proposed. First, some attribute dimensions are probabilistically selected from the global domain. Then, for these dimensions, the partition coefficient is calculated and the optimal partition point is determined. Furthermore, an improved KD-tree structure is introduced in which a node is a collection rather than a data point. The proposed KD-tree node is divided into left and right child nodes by the hyper-plane passing through the dividing point and perpendicular to the optimal dimension. The proposed algorithm is validated by a theoretical analysis and comparison experiments. The results show that the proposed algorithm can reduce the average generalization range by 11% to 22% compared to traditional k-anonymity. This enables better division and better dataset availability. Moreover, the runtime is reduced by 8% to 32% compared to globally optimal projection partitioning k-anonymity.
引用
收藏
页码:1415 / 1437
页数:23
相关论文
共 50 条
  • [1] A semantic k-anonymity privacy protection method for publishing sparse location data
    Yang, Xudong
    Gao, Ling
    Wang, Hai
    Zheng, Jie
    Guo, Hongbo
    [J]. 2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2019, : 216 - 222
  • [2] Systematic Evaluation of Probabilistic k-Anonymity for Privacy Preserving Micro-data Publishing and Analysis
    Senavirathne, Navoda
    Torra, Vicenc
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 307 - 320
  • [3] The k-anonymity approach for data-publishing based on clustering partition
    Jiang, Huo-Wen
    Wang, Ye-Fu
    Xiong, Huan-Liang
    [J]. WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 423 - 428
  • [4] Anatomy: Uncertain data k-anonymity privacy protection algorithm
    Ren, Xiangmin
    Jia, Boxuan
    Wang, Kechao
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1689 - +
  • [5] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [6] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    [J]. 2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [7] Methods for Privacy Protection Using K-Anonymity
    Sharma, Vijay
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
  • [8] Algorithm for k-anonymity based on ball-tree and projection area density partition
    Chen Cheng
    Liu Xiaoli
    Wei Linfeng
    Lin Longxin
    Wu Xiaofeng
    [J]. 14TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND EDUCATION (ICCSE 2019), 2019, : 972 - 975
  • [9] Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing
    Liu, Peng
    Bai, Yan
    Wang, Lie
    Li, Xianxian
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2017, 27 (01) : 71 - 90
  • [10] K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments
    Burke, Mark-John
    Kayem, Anne V. D. M.
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 833 - 840