An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data

被引:1
作者
Yuan, Linlin [1 ,2 ]
Zhang, Tiantian [1 ,3 ]
Chen, Yuling [1 ]
Yang, Yuxiang [1 ]
Li, Huang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Guizhou Open Univ, Coll Informat Engn, Guiyang 550023, Peoples R China
[3] Guizhou Acad Tobacco Sci, Guiyang, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 01期
关键词
Blockchain; big data; K-anonymity; 2-means clustering; greedy algorithm; mean-center method; MODEL;
D O I
10.32604/cmc.2023.046907
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of technologies such as big data and blockchain has brought convenience to life, but at the same time, privacy and security issues are becoming more and more prominent. The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users' privacy by anonymizing big data. However, the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability. In addition, ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced. Based on this, we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data, while guaranteeing improved data usability. Specifically, we construct a new information loss function based on the information quantity theory. Considering that different quasi-identification attributes have different impacts on sensitive attributes, we set weights for each quasi-identification attribute when designing the information loss function. In addition, to reduce information loss, we improve K-anonymity in two ways. First, we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms, i.e., greedy algorithm and 2-means clustering algorithm. In addition, we improve the 2means clustering algorithm by designing a mean-center method to select the initial center of mass. Meanwhile, we design the K-anonymity algorithm of this scheme based on the constructed information loss function, the improved 2-means clustering algorithm, and the greedy algorithm, which reduces the information loss. Finally, we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss.
引用
收藏
页码:1561 / 1579
页数:19
相关论文
共 50 条
  • [41] Betweenness Centrality Based k-Anonymity for Privacy Preserving in Social Networks
    Tian, Hui
    Lu, Yue
    Liu, Jingtian
    Yu, Jingjing
    16TH INTERNATIONAL CONFERENCE ON ADVANCES IN MOBILE COMPUTING AND MULTIMEDIA (MOMM 2018), 2014, : 3 - 7
  • [42] K-Anonymity for Preserving Data on Hands-Using Android Application Development
    Sheshikala, M.
    Prakash, R. Vijaya
    Kadampur, Md. Ali
    PROCEEDINGS OF THE 9TH INDIA SOFTWARE ENGINEERING CONFERENCE, 2016, : 197 - 197
  • [43] A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
    Sowmiya, B.
    Poovammal, E.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1359 - 1376
  • [44] A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
    B. Sowmiya
    E. Poovammal
    Wireless Personal Communications, 2022, 127 : 1359 - 1376
  • [45] An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud
    Sun, Yi
    Liu, Qian
    Chen, Xingyuan
    Du, Xuehui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3295 - 3310
  • [46] Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 678 - 688
  • [47] Hermes: A Privacy-Preserving Approximate Search Framework for Big Data
    Zhou, Zhigang
    Zhang, Hongli
    Li, Shang
    Du, Xiaojiang
    IEEE ACCESS, 2018, 6 : 20009 - 20020
  • [48] Privacy-Preserving Access Control Model for Big Data Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 130 - 135
  • [49] An Efficient and Privacy-preserving Similarity Evaluation For Big Data Analytics
    Gheid, Zakaria
    Challal, Yacine
    2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 281 - 289
  • [50] Anonymous Privacy-Preserving Scheme for Big Data Over the Cloud
    Al-Odat, Zeyad A.
    Khan, Samee U.
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5711 - 5717