Data privacy preservation algorithm with k-anonymity
نویسندگان
چکیده
Abstract With growing concern of data privacy violations, preservation processes become more intense. The k -anonymity method, a widely applied technique, transforms the such that publishing datasets must have at least tuples to same link-able attribute, quasi-identifiers, values. From observations, we found that, in certain domain, all quasi-identifiers datasets, can type. This type attribute is considered as an Identical Generalization Hierarchy ( IGH ) data. An has particular set characteristics could utilize for enhancing efficiency heuristic algorithms. In this paper, propose algorithm on developed from observations anonymous property problem structure eliminate constraints consideration. experiment results are presented proposed effectively preserve and also reduce number visited nodes ensuring protection, which most time-consuming process, compared efficient existing by 21%.
منابع مشابه
Clustering Based K-anonymity Algorithm for Privacy Preservation
K-anonymity is an effective model for protecting privacy while publishing data, which can be implemented by different ways. Among them, local generalization are popular because of its low information loss. But such algorithms are generally computation expensive making it difficult to perform well in the case of large amount of data. In order to solve this problem, this paper proposes a clusteri...
متن کاملA k -Anonymity Clustering Method for Effective Data Privacy Preservation
Data privacy preservation has drawn considerable interests in data mining research recently. The k-anonymity model is a simple and practical approach for data privacy preservation. This paper proposes a novel clustering method for conducting the k-anonymity model effectively. In the proposed clustering method, feature weights are automatically adjusted so that the information distortion can be ...
متن کاملA Clustering K-Anonymity Scheme for Location Privacy Preservation
The continuous advances in sensing and positioning technologies have resulted in a dramatic increase in popularity of LocationBased Services (LBS). Nevertheless, the LBS can lead to user privacy breach due to sharing location information with potentially malicious services. A high degree of location privacy preservation for LBS is extremely required. In this paper, a clustering K-anonymity sche...
متن کاملA K-Anonymity Based Schema for Location Privacy Preservation
In recent years, with the development of mobile devices, the location based services (LBSs) have become more and more prevailing and most applications installed on these devices call for location information. Yet, the untrusted LBS provider can collect these location information, which may potentially threaten users’ location privacy. In view of this challenge, we propose a two-tier schema for ...
متن کامل(alpha, k)-anonymity Based Privacy Preservation by Lossy Join
Privacy-preserving data publication for data mining is to protect sensitive information of individuals in published data while the distortion to the data is minimized. Recently, it is shown that (α, k)anonymity is a feasible technique when we are given some sensitive attribute(s) and quasi-identifier attributes. In previous work, generalization of the given data table has been used for the anon...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: World Wide Web
سال: 2021
ISSN: ['1573-1413', '1386-145X']
DOI: https://doi.org/10.1007/s11280-021-00922-2