SW-SDF Based Personal Privacy with QIDBAnonymization Method

被引:0
|
作者
Kiran, P. [1 ]
Kavya, N. P. [2 ]
机构
[1] VTU, Belgaum, Karnataka, India
[2] RNSIT, Dept MCA, Bangalore, Karnataka, India
关键词
Privacy Peserving Data Mining(PPDM); Privacy Preserving Data Publishing(PPDP); Personal Anonymization;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Personalized anonymization is a method in which a guarding node is used to indicate whether the record owner is ready to reveal its sensitivity based on which anonymization will be performed. Most of the sensitive values that are present in the private data base do not require privacy preservation since the record owner sensitivity is a general one. So there are only few records in the entire distribution that require privacy. For example a record owner having disease flu doesn't mind revealing his identity as compared to record owner having disease cancer. Even in this some of the record owners who have cancer are ready to reveal their identity, this is the motivation for SW-SDF based Personal Privacy. In this paper we propose a novel personalized privacy preserving technique that over comes the disadvantages of previous personalized privacy and other anonymization techniques. The core of this method can be divided in to two major components. The first component deals with additional attribute used in the table which is in the form of flags which can be used to divide sensitive attribute. Sensitive Disclosure Flag (SDF) determines whether record owner sensitive information is to be disclosed or whether privacy should be maintained. The second flag that we are using is Sensitive Weigh (SW) which indicates how much sensitive the attribute value is as compared with the rest. Second section deals with a novel representation called Frequency Distribution Block (FDB) and Quasi-Identifier Distribution Block(QIDB) which is used in anonymization. Experimental result show that it has lesser information loss and faster execution time as compared with existing methods.
引用
收藏
页码:60 / 66
页数:7
相关论文
共 50 条
  • [21] Application of Personal Information Privacy Protection Based on Machine Learning Algorithm
    Lang, Fang
    Zhong, Yunfei
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [22] Privacy-Aware Personal Information Discovery Model based on the cloud
    da Costa, Thiago Moreira
    Martin, Herve
    Agoulmine, Nazim
    [J]. LANOMS 2015 8TH LATIN AMERICAN NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2015, : 35 - 40
  • [23] Personal Data Market Optimization Pricing Model Based on Privacy Level
    Yang, Jian
    Xing, Chunxiao
    [J]. INFORMATION, 2019, 10 (04):
  • [24] Design and evaluation of personal audio systems based on speech privacy constraints
    Wallace, Daniel
    Cheer, Jordan
    [J]. JOURNAL OF THE ACOUSTICAL SOCIETY OF AMERICA, 2020, 147 (04): : 2271 - 2282
  • [25] Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology
    Iwaihara, Mizuho
    Murakami, Kohei
    Ahn, Gail-Joon
    Yoshikawa, Masatoshi
    [J]. CONCEPTUAL MODELING - ER 2008, PROCEEDINGS, 2008, 5231 : 183 - +
  • [26] DSPM: A Platform for Personal Data Share and Privacy Protect Based on Metadata
    Dong, Xiangqian
    Guo, Bing
    Duan, Xuliang
    Shen, Yuncheng
    Zhang, Hong
    Shen, Yan
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS) - PROCEEDINGS, 2016, : 182 - 185
  • [27] AN IDENTITY-BASED PERSONAL LOCATION SYSTEM WITH PROTECTED PRIVACY IN IOT
    Hu, Chunye
    Zhang, Jie
    Wen, Qiaoyan
    [J]. 2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 192 - 195
  • [28] A Semantic Inference Based Method for Privacy Measurement
    Chen, Baocun
    Zhu, Nafei
    He, Jingsha
    He, Peng
    Jin, Shuting
    Pan, Shijia
    [J]. IEEE ACCESS, 2020, 8 : 200112 - 200128
  • [29] Histogram Publishing Method Based on Differential Privacy
    Liu, Xin
    Li, Shengen
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (CSSE 2018), 2018, : 117 - 128
  • [30] Privacy Protection Method Based on Access Control
    Qiao, Xin
    Wang, Lixiaoyang
    Qin, Bo
    Chen, Hong
    Zhao, Suyun
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 254 - 259