Efficient systematic clustering method for k -anonymization

作者: Md. Enamul Kabir , Hua Wang , Elisa Bertino

DOI: 10.1007/S00236-010-0131-6

关键词:

摘要: This paper presents a clustering (Clustering partitions record into clusters such that records within cluster are similar to each other, while in different most distinct from one another.) based k-anonymization technique minimize the information loss at same time assuring data quality. Privacy preservation of individuals has drawn considerable interests mining research. The k-anonymity model proposed by Samarati and Sweeney is practical approach for privacy been studied extensively last few years. Anonymization methods via generalization or suppression able protect private information, but lose valued information. challenge how during anonymization process. We refer as systematic problem which analysed this paper. adopts group-similar together then anonymizes group individually. structure defined investigated through paradigm properties. An algorithm developed shown complexity $${O(\frac{n^{2}}{k})}$$, where n total number containing concerning their privacy. Experimental results show our method attains reasonable dominance with respect both execution time. Finally illustrates usability incremental datasets.

参考文章(27)
Ashley Plank, Xiaoxun Sun, Hua Wang, Min Li, An efficient hash-based algorithm for minimal k -anonymity ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74. pp. 101- 107 ,(2008)
Philip S. Yu, Charu C. Aggarwal, Privacy-Preserving Data Mining: Models and Algorithms Springer. ,(2008)
Jiuyong Li, Xiaoxun Sun, Hua Wang, Priority driven k -anonymisation for privacy protection australasian data mining conference. pp. 73- 78 ,(2008)
Chuang-Cheng Chiu, Chieh-Yuan Tsai, A k-Anonymity Clustering Method for Effective Data Privacy Preservation advanced data mining and applications. pp. 89- 99 ,(2007) , 10.1007/978-3-540-73871-8_10
Grigorios Loukides, Jianhua Shao, Capturing data usefulness and privacy protection in K-anonymisation Proceedings of the 2007 ACM symposium on Applied computing - SAC '07. pp. 370- 374 ,(2007) , 10.1145/1244002.1244091
Agusti Solanas, Francesc Sebé, Josep Domingo-Ferrer, Micro-aggregation-based heuristics for p-sensitive k-anonymity Proceedings of the 2008 international workshop on Privacy and anonymity in information society - PAIS '08. pp. 61- 69 ,(2008) , 10.1145/1379287.1379300
Teofilo F. Gonzalez, Clustering to minimize the maximum intercluster distance Theoretical Computer Science. ,vol. 38, pp. 293- 306 ,(1985) , 10.1016/0304-3975(85)90224-5
Raymond Chi-Wing, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang, (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing knowledge discovery and data mining. pp. 754- 759 ,(2006) , 10.1145/1150402.1150499
Jun-Lin Lin, Meng-Cheng Wei, An efficient clustering method for k-anonymization Proceedings of the 2008 international workshop on Privacy and anonymity in information society - PAIS '08. pp. 46- 50 ,(2008) , 10.1145/1379287.1379297
Adam Meyerson, Ryan Williams, On the complexity of optimal K-anonymity Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems - PODS '04. pp. 223- 228 ,(2004) , 10.1145/1055558.1055591