Computer Science ›› 2013, Vol. 40 ›› Issue (Z6): 349-353.

Previous Articles     Next Articles

Personalized Privacy Preserving Method Based on Lossy Join

LIU Ying-hua   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Recently,anonymity model is one of the hot topic techniques in privacy preserving research.The mainly research is how to avoid leakage of sensitive data in data publishing,but also ensures the efficient use of data.This paper proposed a personalized(α[s],k) - lossy decomposition anonymity model.This method publishes the personalized data though generalization technology and personalizedα restriction for different code of the generalization tree.Based on the idea of lossy decomposition in database,data is projected into the sensitive information table and non sensitive information table,and then the redundant information can be realized privacy protection.Experimental results show that the model can provide better privacy.

Key words: Data dissemination,Privacy preserving,Data mining,Lossy join,k-anonymity

[1] Sweeney L.Achieving K-Anonymity Privacy ProtectionUsing Generalization and Suppression [J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):571-588
[2] Sweeney L.K-anonymity:a model for protecting privacy [J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570
[3] Wong R,LI J,et al.(α,k)-anonymity:an enhanced k-anonymity model for privacy-preserving data publishing[C]∥Proc of the 12th ACM SIGMOD Int’l Conf.New York,2006:754-759
[4] Truta,Vinay B.Privacy protection:p-sensitive k-anonymityproperty[C]∥Proc of 22nd IEEE Int’l Conf.on Data Enginee-ring Workshops.Washington DC:IEEE computer Society,2006:94-103
[5] Nergiz M E,Cliftion C.MultiRelational k-Anonymity [C]∥Proc of the IEEE 23rd Int’l Conf.2007:1417-1421
[6] Machanavajjhala A,Kifer D,Gehrke J,et al.-diversity:Privacy beyond k-anonymity[C]∥Proc of the 22nd Int’l Conf.on Data Engineering.New York:ACM,2006:24-35
[7] Li Ning-hui,Li Tian-cheng.T-Closeness:Privacy Beyond k-Anonymity and -Diversity [C]∥Proc of 23rd Int’l Conf.on Data Engineering.2007:106-115
[8] Xiao Xiao-kui,Tao Yu-fei.Personalized privacy preservation[C]∥Proc of ACM SIGMOD Conf.on Management of Data.Chicago USA,2006:229-240 (下转第383页)(上接第353页)
[9] Wong R,Li J,Fu A,et al.(alpha,k)-anonymity:An enhanced k-anonymity model for privacy-preserving data publishing[C]∥Proc of KDD 2006.New York:ACM,2006:754-759
[10] Xiao Xiao-kui,Tao Yu-fei.m-Invariance:Towards Privacy Pre-serving Re-publication of Dynamic Datasets[C]∥Proc of the ACM SIGMOD Int’l Conf.on Management of Data.2007:689-700
[11] 刘玉葆,黄志兰,傅慰慈,等.基于有损分解的数据隐私保护方法[J].计算机研究与发展,2009,6(7):1217-1224
[12] 周水庚,李丰,陶宇飞,等.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-860

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!