(δ,l)-diversity: Privacy Preservation for Publication Numerical Sensitive Data
نویسنده
چکیده
(ε,m)-anonymity considers ε as the interval to define similarity between two values, and m as the level of privacy protection. For example {40,60} satisfies (ε,m)-anonymity but {40,50,60} doesn't, for ε=15 and m=2. We show that protection in {40,50,60} sensitive values of an equivalence class is not less (if don't say more) than {40,60}. Therefore, although (ε,m)anonymity has well studied publication of numerical sensitive values, it fails to address proximity in the right way. Accordingly, we introduce a revised principle which solve this problem by introducing (δ,l)-diversity principle. Surprisingly, in contrast with (ε,m)-anonymity, the proposed principle respects monotonicity property which makes it adoptable to be exploited in other anonymity principles.
منابع مشابه
Preserving Micro Data Release: Categorical and Numerical Data
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. All the attributes in a data base table can be classified into three categories as identifying attributes, sensitive attributes and quasi-identifier attributes. KAnonymity is the popular approach for privacy preserving data mining and the problems with Kanonymi...
متن کاملA Family of Enhanced (L, α)-Diversity Models For Privacy Preserving Data Publishing
Privacy preservation is an important issue in the release of data for mining purposes. Recently, a novel l-diversity privacy model was proposed, however, even an l-diverse data set may have some severe problems leading to reveal individual sensitive information. In this paper, we remedy the problem by introducing distinct (l, α)-diversity, which, intuitively, demands that the total weight of th...
متن کاملPrivacy and Utility Preserving Task Independent Data Mining
Today’s world of universal data exchange, there is a need to manage the risk of unintended information disclosure. Publishing the data about the individuals, without revealing sensitive information about them is an important problem. K-anonymization is the popular approach used for data publishing. The limitations of Kanonymity were overcome by methods like L-diversity, T-closeness, (alpha, K) ...
متن کاملDATA PRIVACY on E-HEALTH CARE SYSTEM
The main goal of this research is to develop and implement data privacy appropriate technique that fit with E-health system. Privacy preserving data is to develop methods without increasing the risk of misuse of the data used to generate those methods. A number of effective methods for privacy preserving data mining have been proposed. Privacy preservation of sensitive information is a key fact...
متن کاملMining Social Media-Utility Based Privacy Preservation
Online social networks and publication of social network data has led to the risk of leakage of confidential information of individuals. This requires the preservation of privacy before such network data is published by service providers. Privacy in online social networks data has been of utmost concern in recent years. Hence, the research in this field is still in its early years. Several publ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012