A K-anonymity Clustering Algorithm Based on the Information Entropy

被引:0
|
作者
Zhang, Jianpei [1 ]
Zhao, Ying [1 ]
Yang, Yue [1 ]
Yang, Jing [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Peoples R China
关键词
clustering; privacy preserving; information entropy; K-anonymity;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Data anonymization techniques are the main way to achieve privacy protection, and as a classical anonymity model, K-anonymity is the most effective and frequently-used. But the majority of K-anonymity algorithms can hardly balance the data quality and efficiency, and ignore the privacy of the data to improve the data quality. To solve the problems above, by introducing the concept of "diameter" and a new clustering criterion based on the parameter of the maximum threshold of equivalence classes, we proposed a K-anonymity clustering algorithm based on the information entropy. The results of experiments showed that both the algorithm efficiency and data security are improved, and meanwhile the total information loss is acceptable, so the proposed algorithm has some practicability in application.
引用
收藏
页码:319 / 324
页数:6
相关论文
共 50 条
  • [1] K-Anonymity Algorithm Based on Improved Clustering
    Zheng, Wantong
    Wang, Zhongyue
    Lv, Tongtong
    Ma, Yong
    Jia, Chunfu
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT II, 2018, 11335 : 462 - 476
  • [2] k-Anonymity Location Privacy Algorithm Based on Clustering
    Zheng, Lijuan
    Yue, Huanhuan
    Li, Zhaoxuan
    Pan, Xiao
    Wu, Mei
    Yang, Fan
    [J]. IEEE ACCESS, 2018, 6 : 28328 - 28338
  • [3] A FAST AND STABLE CLUSTERING ALGORITHM FOR K-ANONYMITY MODEL
    Chen, Tung-Shou
    Chen, Jeanne
    Chen, Chung-Kuang
    Kao, Yuan-Hung
    [J]. 2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 275 - 279
  • [4] An improved weighted-feature clustering algorithm for k-anonymity
    Lu, Lijian
    Ye, Xiaojun
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 415 - 418
  • [5] An Improved Algorithm for K-anonymity
    Zhang, Jing
    Gong, Xiujun
    Han, Zhipeng
    Feng, Siling
    [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 352 - +
  • [6] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
  • [7] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [8] K-anonymity Through the Enhanced Clustering Method
    Pramanik, Md Ileas
    Lau, Raymond Y. K.
    Zhang, Wenping
    [J]. 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2016, : 85 - 91
  • [9] Evolutionary Algorithms For k-Anonymity In Social Networks Based On Clustering Approach
    Yazdanjue, Navid
    Fathian, Mohammad
    Amiri, Babak
    [J]. COMPUTER JOURNAL, 2020, 63 (07): : 1039 - 1062
  • [10] Evaluation of an Entropy-based k-Anonymity Model for Location Based Services
    Sharma, Varun
    Shen, Chien-Chung
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 374 - 378