The K-Anonymization Method Satisfying Personalized Privacy Preservation

被引:0
|
作者
Song, Jinling [1 ]
Huang, Liming [1 ]
Wang, Gang [1 ]
Kang, Yan [1 ]
Liu, Haibin [1 ]
机构
[1] Hebei Normal Univ Sci & Technol, Qinhuangdao 066004, Peoples R China
关键词
ANONYMITY;
D O I
10.3303/CET1546031
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Even if k-anonymity model can prevent publishing data from disclosing privacy effectively and efficiently, due to the uneven distribution of the sensitive data, ordinary k-anonymization method cannot guarantee each tuple satisfying the personalized privacy requirement of it's data owner although the publishing table has been satisfied k-anonymity constraint. The reason which k-anonymity table fails to satisfy personalized privacy requirement is analyzed firstly, then Correlate degree of Sensitive Values, Leakage Collection, privacy disclosure metric and data quality metric are presented. At last an anonymization method satisfying personalized privacy requirements is presented, in which a utility-driven adaptive clustering method is proposed to partition tuples with similar best data quality.
引用
收藏
页码:181 / 186
页数:6
相关论文
共 50 条
  • [1] Efficient k-anonymization for privacy preservation
    Liang, Z.
    Wei, R.
    [J]. PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 737 - 742
  • [2] Privacy Preservation by k-Anonymization of Weighted Social Networks
    Skarkala, Maria E.
    Maragoudakis, Manolis
    Gritzalis, Stefanos
    Mitrou, Lilian
    Toivonen, Hannu
    Moen, Pirjo
    [J]. 2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 423 - 428
  • [3] On Sampling, Anonymization, and Differential Privacy Or, K-Anonymization Meets Differential Privacy
    Li, Ninghui
    Qardaji, Wahbeh
    Su, Dong
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [4] Data privacy through optimal k-anonymization
    Bayardo, RJ
    Agrawal, R
    [J]. ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2005, : 217 - 228
  • [5] A Hybrid Method for k-Anonymization
    Lin, Jun-Lin
    Wei, Meng-Cheng
    Li, Chih-Wen
    Hsieh, Kuo-Chiang
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 385 - 390
  • [6] Adaptive Privacy Preservation Approach for Big Data Publishing in Cloud using k-anonymization
    Madan S.
    Goswami P.
    [J]. Recent Advances in Computer Science and Communications, 2021, 14 (08) : 2678 - 2688
  • [7] K-Anonymization approach for privacy preservation using data perturbation techniques in data mining
    Kiran, Ajmeera
    Shirisha, N.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 64 : 578 - 584
  • [8] K-Anonymization approach for privacy preservation using data perturbation techniques in data mining
    Kiran, Ajmeera
    Shirisha, N.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 64 : 578 - 584
  • [9] A novel approach to achieving k-anonymization for social network privacy preservation based on vertex connectivity
    Jiang Huowen
    Xiong Huanliang
    Zhang Huiyun
    [J]. 2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2015, : 1097 - 1100
  • [10] Balanced k-Anonymization
    Al-Fedaghi, Sabah S.
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 179 - 182