A K-anonymity Clustering Algorithm Based on the Information Entropy

被引:0
|
作者
Zhang, Jianpei [1 ]
Zhao, Ying [1 ]
Yang, Yue [1 ]
Yang, Jing [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Peoples R China
关键词
clustering; privacy preserving; information entropy; K-anonymity;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Data anonymization techniques are the main way to achieve privacy protection, and as a classical anonymity model, K-anonymity is the most effective and frequently-used. But the majority of K-anonymity algorithms can hardly balance the data quality and efficiency, and ignore the privacy of the data to improve the data quality. To solve the problems above, by introducing the concept of "diameter" and a new clustering criterion based on the parameter of the maximum threshold of equivalence classes, we proposed a K-anonymity clustering algorithm based on the information entropy. The results of experiments showed that both the algorithm efficiency and data security are improved, and meanwhile the total information loss is acceptable, so the proposed algorithm has some practicability in application.
引用
收藏
页码:319 / 324
页数:6
相关论文
共 50 条
  • [21] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    [J]. World Wide Web, 2021, 24 : 1551 - 1561
  • [22] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [23] Multidimensional K-anonymity partition method using entropy
    Yan, Hua
    Liu, Gui-Song
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (06): : 1228 - 1231
  • [24] Achieving k-anonymity by clustering in attribute hierarchical structures
    Li, Jiuyong
    Wong, Raymond Chi-Wing
    Fu, Ada Wai-Chee
    Pei, Jian
    [J]. DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4081 : 405 - 416
  • [25] Reciprocal Cloaking Algorithm for Spatial K-Anonymity
    侯士江
    刘国华
    [J]. Journal of Donghua University(English Edition), 2013, 30 (01) : 49 - 53
  • [26] A practical approximation algorithm for optimal k-anonymity
    Kenig, Batya
    Tassa, Tamir
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2012, 25 (01) : 134 - 168
  • [27] Data privacy preservation algorithm with k-anonymity
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05): : 1551 - 1561
  • [28] A General Algorithm for k-anonymity on Dynamic Databases
    Salas, Julian
    Torra, Vicenc
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2018, 11025 : 407 - 414
  • [29] Risk & distortion based K-anonymity
    Xu, Shenkun
    Ye, Xiaojun
    [J]. INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 345 - 358
  • [30] A Topological k-Anonymity Model Based on Collaborative Multi-view Clustering
    Zouinina, Sarah
    Grozavu, Nistor
    Bennani, Younes
    Lyhyaoui, Abdelouahid
    Rogovschi, Nicoleta
    [J]. ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2018, PT III, 2018, 11141 : 817 - 827