SW-SDF Based Personal Privacy with QIDBAnonymization Method

被引:0
|
作者
Kiran, P. [1 ]
Kavya, N. P. [2 ]
机构
[1] VTU, Belgaum, Karnataka, India
[2] RNSIT, Dept MCA, Bangalore, Karnataka, India
关键词
Privacy Peserving Data Mining(PPDM); Privacy Preserving Data Publishing(PPDP); Personal Anonymization;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Personalized anonymization is a method in which a guarding node is used to indicate whether the record owner is ready to reveal its sensitivity based on which anonymization will be performed. Most of the sensitive values that are present in the private data base do not require privacy preservation since the record owner sensitivity is a general one. So there are only few records in the entire distribution that require privacy. For example a record owner having disease flu doesn't mind revealing his identity as compared to record owner having disease cancer. Even in this some of the record owners who have cancer are ready to reveal their identity, this is the motivation for SW-SDF based Personal Privacy. In this paper we propose a novel personalized privacy preserving technique that over comes the disadvantages of previous personalized privacy and other anonymization techniques. The core of this method can be divided in to two major components. The first component deals with additional attribute used in the table which is in the form of flags which can be used to divide sensitive attribute. Sensitive Disclosure Flag (SDF) determines whether record owner sensitive information is to be disclosed or whether privacy should be maintained. The second flag that we are using is Sensitive Weigh (SW) which indicates how much sensitive the attribute value is as compared with the rest. Second section deals with a novel representation called Frequency Distribution Block (FDB) and Quasi-Identifier Distribution Block(QIDB) which is used in anonymization. Experimental result show that it has lesser information loss and faster execution time as compared with existing methods.
引用
收藏
页码:60 / 66
页数:7
相关论文
共 50 条
  • [31] Group Coding Location Privacy Protection Method Based on Differential Privacy in Crowdsensing
    Wang, Taochun
    Tao, Yuan
    Zhang, Qiong
    Xu, Nuo
    Chen, Fulong
    Zhao, Chuanxin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (17): : 28398 - 28408
  • [32] Location privacy protection method based on differential privacy in crowdsensing task allocation
    Zhang, Qiong
    Wang, Taochun
    Tao, Yuan
    Xu, Nuo
    Chen, Fulong
    Xie, Dong
    [J]. AD HOC NETWORKS, 2024, 158
  • [33] A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
    William J. Buchanan
    Zbigniew Kwecka
    Elias Ekonomou
    [J]. Mobile Networks and Applications, 2013, 18 : 728 - 737
  • [34] A Local Differential Privacy Based Privacy-Preserving Grid Clustering Method
    Zhang D.-Y.
    Ni W.-W.
    Zhang S.
    Fu N.
    Hou L.-H.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (02): : 422 - 435
  • [35] A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
    Buchanan, William J.
    Kwecka, Zbigniew
    Ekonomou, Elias
    [J]. MOBILE NETWORKS & APPLICATIONS, 2013, 18 (05): : 728 - 737
  • [36] PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data
    Liang, Wei
    Yang, Yang
    Yang, Ce
    Hu, Yonghua
    Xie, Songyou
    Li, Kuan-Ching
    Cao, Jiannong
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2023, 72 (02) : 586 - 598
  • [37] Awareness and Control of Personal Data Based on the Cyber-I Privacy Model
    Tang, Li
    Ma, Jianhua
    Huang, Runhe
    Apduhan, Bernady O.
    Li, He
    Cheng, Shaoyin
    [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 456 - 463
  • [38] A K-anonymity Based Semantic Model For Protecting Personal Information and Privacy
    Omran, Esraa
    Bokma, Albert
    Abu-Almaati, Shereef
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1443 - +
  • [39] Research on the personal privacy information protection problem based on computer security technology
    Zhong, Shuangxi
    Zhang, Min
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 917 - 923
  • [40] Personal Information Privacy Protection Methods Based on Relational Encryption for the Internet of Things
    Feng, Li
    [J]. Engineering Intelligent Systems, 2023, 31 (02): : 127 - 139