Anonymous Methods Based on Multi-Attribute Clustering and Generalization Constraints

نویسندگان

چکیده

The dissemination and sharing of data sheets in IoT applications presents privacy security challenges that can be addressed using the k-anonymization algorithm. However, this method needs improvement, for example, areas related to its overgeneralization insufficient attribute diversity constraints during anonymization process. To address these issues, study proposes a multi-attribute clustering generalization (k,l)-anonymization applied multidimensional tables. algorithm first used greedy strategy rank attributes by width first, derived division into dimensions construct hierarchy, then selected with most significant values as priority attributes. Next, k-nearest neighbor (KNN) was introduced determine initial center width-first results, divide quasi-identifier KNN clusters according distance metric, generalize equivalence class hierarchical structure. Then, proposed re-evaluated generalized before each operation. Finally, employed an improved frequency–diversity constraint sensitive order ensure there were at least l records mutually dissimilar closest class. While limiting frequency threshold occurrence attributes, remained similar within group, thus achieving protection anonymity all

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous attribute certificates based on traceable signatures

Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions. Design/methodology/approach – The “traceable signature” scheme was used in conjunction with the “privilege management infrastructure”. Findings – The cryptographic primitive provides a suitable tool for anonymous and un...

متن کامل

Cryptanalysis of Searchable Anonymous Attribute Based Encryption

Ciphertext Policy Attribute Based Encryption (CP ABE) is a public key primitive in which a user is only able to decrypt a ciphertext if the attributes associated with secret key and the access policy connected with ciphertext matches. CP-ABE provides both confidentiality and access control to the data stored in public cloud. Anonymous CP-ABE is an adaptation of ABE where in addition to data con...

متن کامل

Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption∗

We introduce the concept of Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption (AMERQCD). In AMERQCD, a plaintext is encrypted under a point in multidimensional space. To a computationally bounded adversary, the ciphertext hides both the plaintext and the point under which it is encrypted. In a range query, a master key owner releases the decryption key for an arbi...

متن کامل

Assessment of distance-based multi-attribute group decision-making methods from a maintenance strategy perspective

Maintenance has been acknowledged by industrial management as a significant influencing factor of plant performance. Effective plant maintenance can be realized by developing a proper maintenance strategy. However, selecting an appropriate maintenance strategy is difficult because maintenance is a non-repetitive task such as production activity. Maintenance also does not leave a consistent trac...

متن کامل

Attribute Clustering Based on Heuristic Tree Partition

Attribute clustering has been previously employed to detect statistical dependence between subsets of variables. Clusters of variables can be appropriately used for detecting highly dependent domain variables and then reducing the complexity of learning Bayesian networks. We propose a novel attribute clustering algorithm motivated by research of complex networks, called the Star Discovery algor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2023

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12081897