Sensitivity-based Anonymization of Big Data

被引:0
|
作者
Al-Zobbi, Mohammed [1 ]
Shahrestani, Seyed [1 ]
Ruan, Chun [1 ]
机构
[1] Western Sydney Univ, Sch Comp Engn & Math, Penrith, NSW, Australia
关键词
Access Control; Anonymization; Big Data; k-anonymity; MapReduce; Sensitivity; PRIVACY PROTECTION; K-ANONYMITY;
D O I
10.1109/LCNW.2016.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data Analytics is widely used as a means of extracting useful information from available data. It is only natural that it is increasingly adapted for processing big data. The rapidly growing demand for big data analytics has several undesirable side-effects. Perhaps, the most significant of those relates to increased risks for data disclosure and privacy violations. Data anonymization can provide promising solutions for minimizing such risks. In this paper, we discuss some of the specific requirements of the anonymization process when dealing with big data. We show that in general, information loss is the result of avoidable generalization of similar or equivalent data. Using these analyses, we propose a novel framework for data anonymization, which expands the k-anonymity properties and concepts and takes the data class values and the sensitivity of data into account. As such, the proposed process can utilize a bottom-up approach, in contrast to most other anonymization methods. The top-down approaches usually generalize all records, the equivalent and the non-equivalent ones. Ours is more methodical, as it avoids the generalization of the equivalent records. With the inclusion of sensitivity levels, we demonstrate that our framework can reduce the iteration steps and the time required to finalize the anonymization, and therefore enhance the overall efficiency of the process
引用
收藏
页码:58 / 64
页数:7
相关论文
共 50 条
  • [41] Sensitivity-Based Model Updating of Building Frames using Modal Test Data
    Altunisik, Ahmet Can
    Karahasan, Olguhan Sevket
    Genc, Ali Fuat
    Okur, Fatih Yesevi
    Gunaydin, Murat
    Adanur, Suleyman
    [J]. KSCE JOURNAL OF CIVIL ENGINEERING, 2018, 22 (10) : 4038 - 4046
  • [42] Stochastic vs. sensitivity-based integral parameter and nuclear data adjustments
    Siefman, D.
    Hursin, M.
    Rochman, D.
    Pelloni, S.
    Pautz, A.
    [J]. EUROPEAN PHYSICAL JOURNAL PLUS, 2018, 133 (10):
  • [43] Sensitivity-Based Model Updating of Building Frames using Modal Test Data
    Ahmet Can Altunişik
    Olguhan Şevket Karahasan
    Ali Fuat Genç
    Fatih Yesevi Okur
    Murat Günaydin
    Süleyman Adanur
    [J]. KSCE Journal of Civil Engineering, 2018, 22 : 4038 - 4046
  • [44] Some Basics on Privacy Techniques, Anonymization and their Big Data Challenges
    Salas, Julian
    Domingo-Ferrer, Josep
    [J]. MATHEMATICS IN COMPUTER SCIENCE, 2018, 12 (03) : 263 - 274
  • [45] Data Anonymization: K-anonymity Sensitivity Analysis
    Santos, Wilson
    Sousa, Goncalo
    Prata, Paula
    Ferrao, Maria Eugenia
    [J]. 2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020), 2020,
  • [46] Tuning LQR Controllers: A Sensitivity-Based Approach
    Masti, Daniele
    Zanon, Mario
    Bemporad, Alberto
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 932 - 937
  • [47] Building a Sensitivity-Based Portfolio Selection Models
    Zhang, Huiming
    Watada, Junzo
    Li, Ye
    Li, You
    Wang, Bo
    [J]. INTELLIGENT DECISION TECHNOLOGIES, 2015, 39 : 673 - 681
  • [48] Anonylitics: From a Small Data to a Big Data Anonymization System for Analytical Projects
    Pomares-Quimbaya, Alexandra
    Sierra-Munera, Alejandro
    Mendoza-Mendoza, Jaime
    Malaver-Moreno, Julian
    Carvajal, Hernan
    Moncayo, Victor
    [J]. PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS (ICEIS), VOL 1, 2019, : 61 - 71
  • [49] Stochastic Learning and Optimization: A Sensitivity-Based Approach
    Zilinskas, Antanas
    [J]. INTERFACES, 2009, 39 (02) : 172 - 174
  • [50] A sensitivity-based approach for pruning architecture of Madalines
    Zeng, Xiaoqin
    Shao, Jing
    Wang, Yingfeng
    Zhong, Shuiming
    [J]. NEURAL COMPUTING & APPLICATIONS, 2009, 18 (08): : 957 - 965