SW-SDF Based Personal Privacy with QIDBAnonymization Method

被引:0
|
作者
Kiran, P. [1 ]
Kavya, N. P. [2 ]
机构
[1] VTU, Belgaum, Karnataka, India
[2] RNSIT, Dept MCA, Bangalore, Karnataka, India
关键词
Privacy Peserving Data Mining(PPDM); Privacy Preserving Data Publishing(PPDP); Personal Anonymization;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Personalized anonymization is a method in which a guarding node is used to indicate whether the record owner is ready to reveal its sensitivity based on which anonymization will be performed. Most of the sensitive values that are present in the private data base do not require privacy preservation since the record owner sensitivity is a general one. So there are only few records in the entire distribution that require privacy. For example a record owner having disease flu doesn't mind revealing his identity as compared to record owner having disease cancer. Even in this some of the record owners who have cancer are ready to reveal their identity, this is the motivation for SW-SDF based Personal Privacy. In this paper we propose a novel personalized privacy preserving technique that over comes the disadvantages of previous personalized privacy and other anonymization techniques. The core of this method can be divided in to two major components. The first component deals with additional attribute used in the table which is in the form of flags which can be used to divide sensitive attribute. Sensitive Disclosure Flag (SDF) determines whether record owner sensitive information is to be disclosed or whether privacy should be maintained. The second flag that we are using is Sensitive Weigh (SW) which indicates how much sensitive the attribute value is as compared with the rest. Second section deals with a novel representation called Frequency Distribution Block (FDB) and Quasi-Identifier Distribution Block(QIDB) which is used in anonymization. Experimental result show that it has lesser information loss and faster execution time as compared with existing methods.
引用
收藏
页码:60 / 66
页数:7
相关论文
共 50 条
  • [1] Assignment of SW using statistical based data model In SW-SDF based personal privacy with QIDB-anonymization method
    Kiran, P.
    Kumar, S. Sathish
    Hemanth, S.
    Kavya, N. P.
    [J]. 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 816 - 821
  • [2] Big Data Management System for Personal Privacy Using SW and SDF
    Sarjapur, Kashinath
    Suma, V.
    Christa, Sharon
    Rao, Jawahar
    [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 2, INDIA 2016, 2016, 434 : 757 - 763
  • [3] Personal big data pricing method based on differential privacy
    Shen, Yuncheng
    Guo, Bing
    Shen, Yan
    Duan, Xuliang
    Dong, Xiangqian
    Zhang, Hong
    Zhang, Chuanwu
    Jiang, Yuming
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [4] Attribute based privacy impact assessment method for the protection of personal data
    Takci, Hidayet
    Canbay, Pelin
    [J]. JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2017, 32 (04): : 1301 - 1310
  • [5] Attribute based privacy impact assessment method for the protection of personal data
    Kişisel verilerin korunmasinda öznitelik tabanli gizlilik etki deǧerlendirmesi yöntemi
    [J]. Canbay, Pelin (pelin@cs.hacettepe.edu.tr), 1600, Gazi Universitesi (32):
  • [6] Dynamic encryption method of personal privacy information in social network based on blockchain technology
    Geng, Feifei
    Yu, Lu
    [J]. International Journal of Web Based Communities, 2022, 18 (3-4) : 262 - 275
  • [7] A Sequence Obfuscation Method for Protecting Personal Genomic Privacy
    Wan, Shibiao
    Wang, Jieqiong
    [J]. FRONTIERS IN GENETICS, 2022, 13
  • [8] An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks
    Kang, Haiyan
    Xiao, Yanhang
    Yin, Jie
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] Entropy Based Personal Privacy Measurement in Ubiquitous Computing
    Ma, Tinghuai
    Cao, Jie
    Otgonbayar, Ankhbayar
    [J]. 2014 7TH INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS (UMEDIA), 2014, : 33 - 36
  • [10] Trajectory Privacy Protection Method Based on Differential Privacy
    Yuan, Shui-Lian
    Pi, De-Chang
    Xu, Meng
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (07): : 1266 - 1273