Computer Science ›› 2018, Vol. 45 ›› Issue (11): 180-186.doi: 10.11896/j.issn.1002-137X.2018.11.028

• Information Security • Previous Articles     Next Articles

Personalized (α,l)-diversity k-anonymity Model for Privacy Preservation

CAO Min-zi1, ZHANG Lin-lin1, BI Xue-hua2, ZHAO Kai1   

  1. (College of Information Science and Engineering,Xinjiang University,Urumqi 830046,China)1
    (Department of Medical Engineering and Technology,Xinjiang Medical University,Urumqi 830011,China)2
  • Received:2017-10-03 Published:2019-02-25

Abstract: Aiming at the problem that traditional privacy preservation model is lack of considering the personalized anonymity,this paper analyzed the existing two personalized anonymity mechanisms.On the basis of k-anonymity and l-diversity model,a personalized (α,l)-diversity k-anonymity model was proposed to solve the existing problems.In the proposed model,the sensitive attribute values are divided into several categories according to their sensitivities,eachcate-gory is assigned with corresponding constraints,and the personalized privacy preservation is provided for specific individuals.The experimental results show that the proposed model can provide stronger privacy preservation while supp-lying personalized service efficiently.

Key words: Privacy preservation, k-anonymity, l-diversity, Personalized anonymity, Generalization

CLC Number: 

  • TP309
[1]MENG X F,ZHANG X J.Big Data Privacy Management[J].Journal of Computer Research and Development,2015,52(2):265-281.(in Chinese)
[2]JIANG H W,ZENG G S,MA H Y.Greedy clustering-anonymity method for privacy preservation of table data-publishing[J].Joural of Software,2017,28(2):341-351.(in Chinese)
[3]SWEENEY L.k-anonymity:a model for protecting privacy[J].International Journal of Uncertainty Fuzziness and Knowledge-Based Systems,2002,10(5):557-570.
[4]MACHANAVAJJHALA A,KIFER D,GEHRKE J.l-diversity:Privacy beyond k-anonymity[J].ACM Transactions on Know-ledge Discovery from Data,2007,1(1):3.
[5]LI N,LI T,VENKATASUBRAMANIAN S.Closeness:a new privacy measure for data publishing[J].IEEE Transactions on Knowledge & Data Engineering,2009,22(7):943-956.
[6]HAN J M,YU J,YU H Q,et al.Individuation Privacy Preservation Oriented to Sensitive Values[J].Acta Electronica Sinica,2010,38(7):1723-1728.(in Chinese)
[7]XIAO X,TAO Y.Personalized privacy preservation[C]∥ACM SIGMOD International Conference on Management of Data.ACM,2006:229-240.
[8]XU Y,QIN X,YANG Z,et al.A personalized k-anonymity privacy preserving method[J].Journal of Information & Computational Science,2013,10(1):139-155.
[9]WANG P.Personalized Anonymity Algorithm Using Clustering Techniques[J].Journal of Computational Information Systems,2011,7(3):924-931.
[10]YE X,ZHANG Y,LIU M.A Personalized (a,k)-Anonymity Model[C]∥The Ninth International Conference on Web-Age Information Management.IEEE Computer Society,2008:341-348.
[11]HAN J,YU H,YU J,et al.A Complete (α,k)-Anonymity Model for Sensitive Values Individuation Preservation[C]∥International Symposium on Electronic Commerce and Security.IEEE,2008:318-323.
[12]SHEN Y,GUO G,WU D,et al.A novel algorithm of persona- lized-granular k-anonymity[C]∥International Conference on Mechatronic Sciences,Electric Engineering and Computer.IEEE,2013:1860-1866.
[13]WANG B,YANG J.A personalized anonymous method based on inverse clustering[J].Acta Electronica Sinica,2012,40(5):883-890.(in Chinese)
[14]WANG B,YANG J.Research on Anonymity Technique for Personalization Privacy-preserving Data Publishing[J].Computer Science,2012,39(4):168-171.(in Chinese)
[15]PRASSER F,BILD R,EICHER J,et al.Lightning:Utility-Dri- ven Anonymization of High-Dimensional Data[J].Transactions on Data Privacy,2016,9(2):161-185.
[16]SUN X,WANG H,LI J,et al.Enhanced P-Sensitive K-Ano- nymity Models for Privacy Preserving Data Publishing[J].Transactions on Data Privacy,2008,1(2):53-66.
[17]KAN Y Y,CAO T J.Enhanced privacy preserving K-anonymity model:(α,L)-diversity K-anonymity[J].Computer Engineering and Applications,2010,46(21):148-151.(in Chinese)
[18]XU J,WANG W,PEI J,et al.Utility-based anonymization for privacy preservation with less information loss[J].ACM SIGKDD Explorations Newsletter,2006,8(2):21-30.
[19]LIU X,XIE Q,WANG L.Personalized extended (α,k)-anonymity model for privacy-preserving data publishing[J].Concurrency & Computation Practice & Experience,2017,29(6):e3886.
[20]BLAKE C.UCI repository of machine learning databases[OL].
[1] TONG Hai,BAI Guang-wei,SHEN Hang. Double-auction-based Incentive Mechanism for k-anonymity [J]. Computer Science, 2019, 46(3): 202-208.
[2] WANG Jing, SI Shu-jian. Attribute Revocable Access Control Scheme for Brain-Computer Interface Technology [J]. Computer Science, 2018, 45(9): 187-194.
[3] REN Hui, DAI Hua and YANG Geng. Secure Comparator Based Privacy-preserving Sorting Algorithms for Clouds [J]. Computer Science, 2018, 45(5): 139-142, 167.
[4] CAI Yi, ZHU Xiu-fang, SUN Zhang-li and CHEN A-jiao. Semi-supervised and Ensemble Learning:A Review [J]. Computer Science, 2017, 44(Z6): 7-13.
[5] WANG Li-wen. Design and Implementation of Arbitrage Trading System Based on Generalization [J]. Computer Science, 2017, 44(Z6): 529-533.
[6] CAO Chun-ping and XU Bang-bing. Research of Privacy-preserving Tag-based Recommendation Algorithm [J]. Computer Science, 2017, 44(8): 134-139.
[7] DAI Hua, YE Qing-qun, YANG Geng, XIAO Fu and HE Rui-liang. Overview of Secure Top-k Query Processing in Two-tiered Wireless Sensor Networks [J]. Computer Science, 2017, 44(5): 6-13, 47.
[8] PENG Rui-qing and WANG Li-na. Fined-grained Location Privacy Protection System for Android Applications [J]. Computer Science, 2016, 43(Z11): 398-402.
[9] MENG Xiao-long YANG Yan WANG Hong-jun XIAO Wen-chao. Occasion Determination of Clustering Ensemble [J]. Computer Science, 2015, 42(7): 48-51, 84.
[10] XU Hua. Integration of Dual-layer Fuzzy System with Center-constrained Minimal Enclosing Ball [J]. Computer Science, 2014, 41(12): 172-175.
[11] CHEN Ping,ZHANG Tao,ZHAO Min,YUAN Zhi-jian and YANG Lan-juan. Database as Service System for Business Database Application Hosting and its Privacy Preservation Mechanism [J]. Computer Science, 2013, 40(11): 140-142,146.
[12] SUN Chong, LU Yan-sheng. Clustering-based Algorithms to Semantic Summarizing the Table with Multi-attributes' Hierarchical Structures [J]. Computer Science, 2012, 39(3): 170-173.
[13] YU Xu,YANG Jing,XIE Zhi-qiang. Research on Virtual Sample Generation Technology [J]. Computer Science, 2011, 38(3): 16-19.
[14] LI Jun-huai,LIU Hai-ling,PING Jun,ZHANG Jing,CHEN Xiao-ming. Method of Association Rule Privacy Protection Based on Temporal Constraint [J]. Computer Science, 2009, 36(9): 201-204.
[15] BA0 Yu, HUANG Guo-xing. Privacy Preserving Association Rule Mining Method Based on Web Logs [J]. Computer Science, 2009, 36(8): 220-223.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .