An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data

被引:1
作者
Yuan, Linlin [1 ,2 ]
Zhang, Tiantian [1 ,3 ]
Chen, Yuling [1 ]
Yang, Yuxiang [1 ]
Li, Huang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Guizhou Open Univ, Coll Informat Engn, Guiyang 550023, Peoples R China
[3] Guizhou Acad Tobacco Sci, Guiyang, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 01期
关键词
Blockchain; big data; K-anonymity; 2-means clustering; greedy algorithm; mean-center method; MODEL;
D O I
10.32604/cmc.2023.046907
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of technologies such as big data and blockchain has brought convenience to life, but at the same time, privacy and security issues are becoming more and more prominent. The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users' privacy by anonymizing big data. However, the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability. In addition, ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced. Based on this, we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data, while guaranteeing improved data usability. Specifically, we construct a new information loss function based on the information quantity theory. Considering that different quasi-identification attributes have different impacts on sensitive attributes, we set weights for each quasi-identification attribute when designing the information loss function. In addition, to reduce information loss, we improve K-anonymity in two ways. First, we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms, i.e., greedy algorithm and 2-means clustering algorithm. In addition, we improve the 2means clustering algorithm by designing a mean-center method to select the initial center of mass. Meanwhile, we design the K-anonymity algorithm of this scheme based on the constructed information loss function, the improved 2-means clustering algorithm, and the greedy algorithm, which reduces the information loss. Finally, we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss.
引用
收藏
页码:1561 / 1579
页数:19
相关论文
共 50 条
  • [31] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
  • [32] Privacy-Preserving Deep Learning on Big Data in Cloud
    Fan, Yongkai
    Zhang, Wanyu
    Bai, Jianrong
    Lei, Xia
    Li, Kuanching
    CHINA COMMUNICATIONS, 2023, 20 (11) : 176 - 186
  • [33] Privacy Preserving for Spatio-Temporal Data Publishing Ensuring Location Diversity Using K-Anonymity Technique
    Avaghade, Sachin B.
    Patil, Sachin S.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [34] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [35] Data Value Estimation for Privacy-Preserving Big/Personal Data Businesses
    Kiyomoto, Shinsaku
    APPLICATIONS + PRACTICAL CONCEPTUALIZATION + MATHEMATICS = FRUITFUL INNOVATION, 2016, 11 : 149 - 158
  • [36] Privacy Preserving for Spatio-Temporal Data Publishing Ensuring Location Diversity Using K-Anonymity Technique
    Avaghade, Sachin B.
    Patil, Sachin S.
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [37] Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption
    Gao, Weichao
    Yu, Wei
    Liang, Fan
    Hatcher, William Grant
    Lu, Chao
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (02): : 776 - 791
  • [38] Differential Privacy in Privacy-Preserving Big Data and Learning: Challenge and Opportunity
    Jiang, Honglu
    Gao, Yifeng
    Sarwar, S. M.
    GarzaPerez, Luis
    Robin, Mahmudul
    SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2021, 2022, 1536 : 33 - 44
  • [39] K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks
    Su, Bing
    Huang, Jiaxuan
    Miao, Kelei
    Wang, Zhangquan
    Zhang, Xudong
    Chen, Yourong
    SENSORS, 2023, 23 (03)
  • [40] A semantic k-anonymity privacy protection method for publishing sparse location data
    Yang, Xudong
    Gao, Ling
    Wang, Hai
    Zheng, Jie
    Guo, Hongbo
    2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2019, : 216 - 222