Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness  被引量:4

在线阅读下载全文

作  者:Rong Wang Yan Zhu Tung-Shou Chen Chin-Chen Chang 

机构地区:[1]School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China [2]Department of Computer Science and Information Engineering, "National" Taichung University of Science and Technology, Taichung 404, China [3]Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, China

出  处:《Journal of Computer Science & Technology》2018年第6期1231-1242,共12页计算机科学技术学报(英文版)

摘  要:Although k-anonymity is a good way of publishing microdata for research purposes, it cannot resist severalcommon attacks, such as attribute disclosure and the similarity attack. To resist these attacks, many refinements of k-anonymity have been proposed with t-closeness being one of the strictest privacy models. While most existing t-closenessmodels address the case in which the original data have only one single sensitive attribute, data with multiple sensitiveattributes are more common in practice. In this paper, we cover this gap with two proposed algorithms for multiple sensitiveattributes and make the published data satisfy t-closeness. Based on the observation that the values of the sensitive attributesin any equivalence class must be as spread as possible over the entire data to make the published data satisfy t-closeness,both of the algorithms use different methods to partition records into groups in terms of sensitive attributes. One uses aclustering method, while the other leverages the principal component analysis. Then, according to the similarity of quasi-identifier attributes, records are selected from different groups to construct an equivalence class, which will reduce the lossof information as much as possible during anonymization. Our proposed algorithms are evaluated using a real dataset. Theresults show that the average speed of the first proposed algorithm is slower than that of the second proposed algorithm butthe former can preserve more original information. In addition, compared with related approaches, both proposed algorithmscan achieve stronger protection of privacy and reduce less.

关 键 词:data PRIVACY K-ANONYMITY t-closeness MULTIPLE sensitive ATTRIBUTE 

分 类 号:TP[自动化与计算机技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象