Anonymous Methods Based on Multi-Attribute Clustering and Generalization Constraints
نویسندگان
چکیده
The dissemination and sharing of data sheets in IoT applications presents privacy security challenges that can be addressed using the k-anonymization algorithm. However, this method needs improvement, for example, areas related to its overgeneralization insufficient attribute diversity constraints during anonymization process. To address these issues, study proposes a multi-attribute clustering generalization (k,l)-anonymization applied multidimensional tables. algorithm first used greedy strategy rank attributes by width first, derived division into dimensions construct hierarchy, then selected with most significant values as priority attributes. Next, k-nearest neighbor (KNN) was introduced determine initial center width-first results, divide quasi-identifier KNN clusters according distance metric, generalize equivalence class hierarchical structure. Then, proposed re-evaluated generalized before each operation. Finally, employed an improved frequency–diversity constraint sensitive order ensure there were at least l records mutually dissimilar closest class. While limiting frequency threshold occurrence attributes, remained similar within group, thus achieving protection anonymity all
منابع مشابه
Anonymous attribute certificates based on traceable signatures
Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions. Design/methodology/approach – The “traceable signature” scheme was used in conjunction with the “privilege management infrastructure”. Findings – The cryptographic primitive provides a suitable tool for anonymous and un...
متن کاملCryptanalysis of Searchable Anonymous Attribute Based Encryption
Ciphertext Policy Attribute Based Encryption (CP ABE) is a public key primitive in which a user is only able to decrypt a ciphertext if the attributes associated with secret key and the access policy connected with ciphertext matches. CP-ABE provides both confidentiality and access control to the data stored in public cloud. Anonymous CP-ABE is an adaptation of ABE where in addition to data con...
متن کاملAnonymous Multi-Attribute Encryption with Range Query and Conditional Decryption∗
We introduce the concept of Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption (AMERQCD). In AMERQCD, a plaintext is encrypted under a point in multidimensional space. To a computationally bounded adversary, the ciphertext hides both the plaintext and the point under which it is encrypted. In a range query, a master key owner releases the decryption key for an arbi...
متن کاملAssessment of distance-based multi-attribute group decision-making methods from a maintenance strategy perspective
Maintenance has been acknowledged by industrial management as a significant influencing factor of plant performance. Effective plant maintenance can be realized by developing a proper maintenance strategy. However, selecting an appropriate maintenance strategy is difficult because maintenance is a non-repetitive task such as production activity. Maintenance also does not leave a consistent trac...
متن کاملAttribute Clustering Based on Heuristic Tree Partition
Attribute clustering has been previously employed to detect statistical dependence between subsets of variables. Clusters of variables can be appropriately used for detecting highly dependent domain variables and then reducing the complexity of learning Bayesian networks. We propose a novel attribute clustering algorithm motivated by research of complex networks, called the Star Discovery algor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2023
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics12081897