Protecting Privacy by Multi-dimensional K-anonymity

نویسندگان

  • Qian Wang
  • Cong Xu
  • Min Sun
چکیده

Privacy protection for incremental data has a great effect on data availability and practicality. Kanonymity is an important approach to protect data privacy in data publishing scenario. However, it is a NP-hard problem for optimal k-anonymity on dataset with multiple attributes. Most partitions in k-anonymity at present are single-dimensional. Now research on k-anonymity mainly focuses on getting high quality anonymity while reducing the time complexity, and new method of realization of kanonymity properties according to the requirement of published data. Although most k-anonymity algorithms perform well on static data, their effects decrease when they are on the changing data of real world. This paper proposes a multi-dimensional k-anonymity algorithm based on mapping and divide-and-conquer strategy that is feasible and performs much better in k-anonymity. The second main contribution of this paper is an effective k-anonymity method based on incremental local update on large dataset. It incrementally updates the changing dataset, and a threshold is set to assure the stability of update. Neighbor equivalence sets and similar equivalence sets are computed by their position, which not only avoids the cost of recalculation aroused by little change of dataset, but also improves the practical application performance since the dataset satisfies k-anonymity properties. The experiment shows that the proposed algorithm has a better performance in both time cost and anonymity quality, compared to the methods at present.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-dimensional k-anonymity Based on Mapping for Protecting Privacy

Data release has privacy disclosure risk if not taking any protection policy. Although attributes that clearly identify individuals, such as Name, Identity Number, are generally removed or decrypted, attackers can still link these databases with other released database on attributes (Quasi-identifiers) to re-identify individual’s private information. K-anonymity is a significant method for priv...

متن کامل

Multi-dimensional K-anonymity based on Mapping for Protecting Privacy1

Data release has privacy disclosure risk if not taking any protection policy. Although attributes that clearly identify individuals, such as Name, Identity Number, are generally removed or decrypted, attackers can still link these databases with other released database on attributes (Quasi-identifiers) to re-identify individual’s private information. K-anonymity is a significant method for priv...

متن کامل

A Customizable k-Anonymity Model for Protecting Location Privacy

Continued advances in mobile networks and positioning technologies have created a strong market push for location-based services (LBSs). Examples include location-aware emergency services, location based service advertisement, and location sensitive billing. One of the big challenges in wide deployment of LBS systems is the privacy-preserving management of location-based data. Without safeguard...

متن کامل

Achieving Multidimensional K-Anonymity by a Greedy Approach

Protecting privacy in microdata publishing is K-Anonymity, Here recoding “models” have been considered for achieving k anonymity[1,2]. We proposes a new multidimensional model, which gives high flexibility. Often this flexibility leads to higher-quality anonymizations, as measured both by general-purpose metrics and more specific notions of query answerability. Like previous multidimensional mo...

متن کامل

Achieving Multidimensional K-Anonymity by a Greedy Approach

Protecting privacy in microdata publishing is K-Anonymity, Here recoding “models” have been considered for achieving k anonymity[1,2]. We proposes a new multidimensional model, which gives high flexibility. Often this flexibility leads to higher-quality anonymizations, as measured both by generalpurpose metrics and more specific notions of query answerability. Like previous multidimensional mod...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JSW

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2012