Protecting Privacy by Multi-dimensional K-anonymity
نویسندگان
چکیده
Privacy protection for incremental data has a great effect on data availability and practicality. Kanonymity is an important approach to protect data privacy in data publishing scenario. However, it is a NP-hard problem for optimal k-anonymity on dataset with multiple attributes. Most partitions in k-anonymity at present are single-dimensional. Now research on k-anonymity mainly focuses on getting high quality anonymity while reducing the time complexity, and new method of realization of kanonymity properties according to the requirement of published data. Although most k-anonymity algorithms perform well on static data, their effects decrease when they are on the changing data of real world. This paper proposes a multi-dimensional k-anonymity algorithm based on mapping and divide-and-conquer strategy that is feasible and performs much better in k-anonymity. The second main contribution of this paper is an effective k-anonymity method based on incremental local update on large dataset. It incrementally updates the changing dataset, and a threshold is set to assure the stability of update. Neighbor equivalence sets and similar equivalence sets are computed by their position, which not only avoids the cost of recalculation aroused by little change of dataset, but also improves the practical application performance since the dataset satisfies k-anonymity properties. The experiment shows that the proposed algorithm has a better performance in both time cost and anonymity quality, compared to the methods at present.
منابع مشابه
Multi-dimensional k-anonymity Based on Mapping for Protecting Privacy
Data release has privacy disclosure risk if not taking any protection policy. Although attributes that clearly identify individuals, such as Name, Identity Number, are generally removed or decrypted, attackers can still link these databases with other released database on attributes (Quasi-identifiers) to re-identify individual’s private information. K-anonymity is a significant method for priv...
متن کاملMulti-dimensional K-anonymity based on Mapping for Protecting Privacy1
Data release has privacy disclosure risk if not taking any protection policy. Although attributes that clearly identify individuals, such as Name, Identity Number, are generally removed or decrypted, attackers can still link these databases with other released database on attributes (Quasi-identifiers) to re-identify individual’s private information. K-anonymity is a significant method for priv...
متن کاملA Customizable k-Anonymity Model for Protecting Location Privacy
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based services (LBSs). Examples include location-aware emergency services, location based service advertisement, and location sensitive billing. One of the big challenges in wide deployment of LBS systems is the privacy-preserving management of location-based data. Without safeguard...
متن کاملAchieving Multidimensional K-Anonymity by a Greedy Approach
Protecting privacy in microdata publishing is K-Anonymity, Here recoding “models” have been considered for achieving k anonymity[1,2]. We proposes a new multidimensional model, which gives high flexibility. Often this flexibility leads to higher-quality anonymizations, as measured both by general-purpose metrics and more specific notions of query answerability. Like previous multidimensional mo...
متن کاملAchieving Multidimensional K-Anonymity by a Greedy Approach
Protecting privacy in microdata publishing is K-Anonymity, Here recoding “models” have been considered for achieving k anonymity[1,2]. We proposes a new multidimensional model, which gives high flexibility. Often this flexibility leads to higher-quality anonymizations, as measured both by generalpurpose metrics and more specific notions of query answerability. Like previous multidimensional mod...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JSW
دوره 7 شماره
صفحات -
تاریخ انتشار 2012