An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data

被引:1
作者
Yuan, Linlin [1 ,2 ]
Zhang, Tiantian [1 ,3 ]
Chen, Yuling [1 ]
Yang, Yuxiang [1 ]
Li, Huang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Guizhou Open Univ, Coll Informat Engn, Guiyang 550023, Peoples R China
[3] Guizhou Acad Tobacco Sci, Guiyang, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 01期
关键词
Blockchain; big data; K-anonymity; 2-means clustering; greedy algorithm; mean-center method; MODEL;
D O I
10.32604/cmc.2023.046907
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of technologies such as big data and blockchain has brought convenience to life, but at the same time, privacy and security issues are becoming more and more prominent. The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users' privacy by anonymizing big data. However, the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability. In addition, ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced. Based on this, we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data, while guaranteeing improved data usability. Specifically, we construct a new information loss function based on the information quantity theory. Considering that different quasi-identification attributes have different impacts on sensitive attributes, we set weights for each quasi-identification attribute when designing the information loss function. In addition, to reduce information loss, we improve K-anonymity in two ways. First, we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms, i.e., greedy algorithm and 2-means clustering algorithm. In addition, we improve the 2means clustering algorithm by designing a mean-center method to select the initial center of mass. Meanwhile, we design the K-anonymity algorithm of this scheme based on the constructed information loss function, the improved 2-means clustering algorithm, and the greedy algorithm, which reduces the information loss. Finally, we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss.
引用
收藏
页码:1561 / 1579
页数:19
相关论文
共 50 条
  • [21] Mastering data privacy: leveraging K-anonymity for robust health data sharing
    Karagiannis, Stylianos
    Ntantogian, Christoforos
    Magkos, Emmanouil
    Tsohou, Aggeliki
    Ribeiro, Luis Landeiro
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2189 - 2201
  • [22] A Practical Privacy-Preserving Publishing Mechanism Based on Personalized k-Anonymity and Temporal Differential Privacy for Wearable IoT Applications
    Guo, Junqi
    Yang, Minghui
    Wan, Boxin
    SYMMETRY-BASEL, 2021, 13 (06):
  • [23] A k-anonymity clustering method for effective data privacy preservation
    Chin, Chuang-Cheng
    Tsai, Chieh-Yuan
    ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2007, 4632 : 89 - 99
  • [24] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [25] Research on uncertain data privacy protection based on K-anonymity
    Jing, Yang
    Xiangmin, Ren
    Jianpei, Zhang
    Kechao, Wang
    Jing, Y. (yangjing@hrbeu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04): : 140 - 149
  • [26] Toward Scalable Anonymization for Privacy-Preserving Big Data Publishing
    Mehta, Brijesh B.
    Rao, Udai Pratap
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 297 - 304
  • [27] Fine-grained k-anonymity for privacy preserving in cloud
    Arava, Karuna
    Lingamgunta, Sumalatha
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2019, 23 (04) : 241 - 247
  • [28] Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity
    Sun, Hui
    Huang, Cheng
    Cheng, Xu
    Chen, Fulong
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 258 - 264
  • [29] k-Anonymity Location Privacy Algorithm Based on Clustering
    Zheng, Lijuan
    Yue, Huanhuan
    Li, Zhaoxuan
    Pan, Xiao
    Wu, Mei
    Yang, Fan
    IEEE ACCESS, 2018, 6 : 28328 - 28338
  • [30] Efficient and Privacy-Preserving k-means clustering For Big Data Mining
    Gheid, Zakaria
    Challal, Yacine
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 791 - 798