Privacy preserving approach based on proximity privacy for numerical sensitive attributes
academic paper|更新时间:2024-06-05
|
Privacy preserving approach based on proximity privacy for numerical sensitive attributes
Journal on CommunicationsVol. 36, Issue 4, Pages: 97-104(2015)
作者机构:
哈尔滨工程大学 计算机科学与技术学院,黑龙江 哈尔滨150001
作者简介:
基金信息:
The National Natural Science Foundation of China(61073041);The National Natural Science Foundation of China(61073043);The National Natural Science Foundation of China(61370083);The National Natural Science Foundation of China(61402126);The Research Fund for the Doctoral Program of Higher Education of China(20112304110011);The Research Fund for the Doctoral Program of Higher Education of China(20122304110012)
Jing XIE, Jian-pei ZHANG, Jing YANG, et al. Privacy preserving approach based on proximity privacy for numerical sensitive attributes[J]. Journal on Communications, 2015, 36(4): 97-104.
DOI:
Jing XIE, Jian-pei ZHANG, Jing YANG, et al. Privacy preserving approach based on proximity privacy for numerical sensitive attributes[J]. Journal on Communications, 2015, 36(4): 97-104. DOI: 10.11959/j.issn.1000-436x.2015093.
Privacy preserving approach based on proximity privacy for numerical sensitive attributes
A model based on proximity breach for numerical sensitive attributes is proposed.At first,it divides numerical sensitive value into several intervals on the premise of protecting the internal relations between quasi-identifier attributes and numerical sensitive attributes.Secondly,it proposes a (k,ε)-proximity privacy preserving principle to defense proximity privacy.In the end,a maximal neighborhood first algorithm (MNF) is designed to realize the (k,ε)-proximity.The experiment results show that the proposed model can preserve privacy of sensitive data well meanwhile it can also keep a high data utility and protect the internal relations.
关键词
Keywords
references
XU Y , MA T , TANG M , et al . A survey of privacy preserving data publishing using generalization and suppression [J ] . Appl Math , 2014 , 8 ( 3 ): 1103 - 1116 .
SWEENEY L . k-anonymity:a model for protecting privacy [J ] . International Journal of Uncertainty,Fuzziness and Knowledge based Systems , 2002 , 10 ( 5 ): 557 - 570 .
TASSA T , MAZZA A , GIONIS A . k-concealment:an alternative model of k-type anonymity [J ] . Transactions on Data Privacy , 2012 , 5 ( 1 ): 189 - 222 .
MACHANAVAJJHALA A , GEHRKE J , KIFER D . l-diversity:privacy beyond k-anonymity [J ] . ACM Transactions on Knowledge Discovery from Data , 2007 , 1 ( 1 ): 1 - 52 .
ABDALAAL A , NERGIZ M E , SAYGIN Y . Privacy-preserving publishing of opinion polls [J ] . Computers & Security , 2013 , 37 ( 9 ): 143 - 154 .
SAROWAR S A H M , LI J , DING X , et al . A general framework for privacy preserving data publishing [J ] . Knowledge-Based Systems , 2013 , 54 ( 12 ): 276 - 287 .
YE M , WU X , HU X , et al . Anonymizing classification data using rough set theory [J ] . Knowledge-Based Systems , 2013 , 43 ( 5 ): 82 - 94 .
ZHANG Q , KOUDAS N , SRIVASTAVA D , et al . Aggregate query answering on anonymized tables [A ] . Data Engineering,2007,ICDE 2007,IEEE 23rd International Conference [C ] . 2007 . 116 - 125 .
LI J X , TAO Y F , XIAO X K . Preservation of proximity privacy in publishing numerical sensitive data [A ] . Proceedings of ACM Conference on Management of Data (SIGMOD) [C ] . 2008 . 473 - 486 .
HAN J M , YU J , YU H Q , et al . A multi-level l-diversity model for numerical sensitive attributes [J ] . Journal of Computer Research and Development , 2011 , 48 ( 1 ): 147 - 158 .
WANG T , MENG S , BAMBA B , et al . A general proximity privacy principle [A ] . Data Engineering,2009,ICDE'09,IEEE 25th International Conference [C ] . 2009 . 1279 - 1282 .
WANG T , LIU L . XColor:protecting general proximity privacy [A ] . Data Engineering (ICDE),2010 IEEE 26th International Conference [C ] . 2010 . 960 - 963 .
CAMPAN A , COOPER N , TRUTA T M . On-the-fly Generalization Hierarchies for Numerical Attributes Revisited [M ] . Secure Data Management,Springer Berlin Heidelberg , 2011 . 18 - 32 .
LEFEVRE K , DEWITT D J , RAMAKRISHNAN R . Incognito:Efficient full-domain k –anonymity [A ] . Proc of the 2005 ACM SIGMOD Int Conf on Management of data [C ] . New York , 2005 . 49 - 60 .
YANG X C , WANG Y Z , WANG B , et al . Privacy preserving approaches for multiple sensitive attributes in data publishing [J ] . Chinese Journal of Computers , 2008 , 31 ( 4 ): 574 - 587 .
LEFEVRE K , DEWITT D J , RAMAKRISHNAN R . Mondrian multidimensional k-anonymity [A ] . Proc of the 22nd Int Conf on Data Engineering [C ] . New York , 2006 . 1 - 11 .