K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks

被引:12
作者
Su, Bing [1 ]
Huang, Jiaxuan [1 ]
Miao, Kelei [2 ]
Wang, Zhangquan [2 ]
Zhang, Xudong [2 ]
Chen, Yourong [2 ]
机构
[1] Changzhou Univ, Sch Comp & Artificial Intelligence, Changzhou 213164, Peoples R China
[2] Zhejiang Shuren Univ, Coll Informat Sci & Technol, Hangzhou 310015, Peoples R China
关键词
K-anonymity; multi-dimensional data; skewness attack; similarity attack; privacy protection;
D O I
10.3390/s23031554
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Currently, a significant focus has been established on the privacy protection of multi-dimensional data publishing in various application scenarios, such as scientific research and policy-making. The K-anonymity mechanism based on clustering is the main method of shared-data desensitization, but it will cause problems of inconsistent clustering results and low clustering accuracy. It also cannot defend against several common attacks, such as skewness and similarity attacks at the same time. To defend against these attacks, we propose a K-anonymity privacy protection algorithm for multi-dimensional data against skewness and similarity attacks (KAPP) combined with t-closeness. Firstly, we propose a multi-dimensional sensitive data clustering algorithm based on improved African vultures optimization. More specifically, we improve the initialization, fitness calculation, and solution update strategy of the clustering center. The improved African vultures optimization can provide the optimal solution with various dimensions and achieve highly accurate clustering of the multi-dimensional dataset based on multiple sensitive attributes. It ensures that multi-dimensional data of different clusters are different in sensitive data. After the dataset anonymization, similar sensitive data of the same equivalence class will become less, and it eventually does not satisfy the premise of being theft by skewness and similarity attacks. We also propose an equivalence class partition method based on the sensitive data distribution difference value measurement and t-closeness. Namely, we calculate the sensitive data distribution's difference value of each equivalence class and then combine the equivalence classes with larger difference values. Each equivalence class satisfies t-closeness. This method can ensure that multi-dimensional data of the same equivalence class are different in multiple sensitive attributes, and thus can effectively defend against skewness and similarity attacks. Moreover, we generalize sensitive attributes with significant weight and all quasi-identifier attributes to achieve anonymous protection of the dataset. The experimental results show that KAPP improves clustering accuracy, diversity, and anonymity compared to other similar methods under skewness and similarity attacks.
引用
收藏
页数:26
相关论文
共 38 条
[1]   African vultures optimization algorithm: A new nature-inspired metaheuristic algorithm for global optimization problems [J].
Abdollahzadeh, Benyamin ;
Gharehchopogh, Farhad Soleimanian ;
Mirjalili, Seyedali .
COMPUTERS & INDUSTRIAL ENGINEERING, 2021, 158
[2]   An efficient privacy mechanism for electronic health records [J].
Anjum, Adeel ;
Malik, Saif Ur Rehman ;
Choo, Kim-Kwang Raymond ;
Khan, Abid ;
Haroon, Asma ;
Khan, Sangeen ;
Khan, Samee U. ;
Ahmad, Naveed ;
Raza, Basit .
COMPUTERS & SECURITY, 2018, 72 :196-211
[3]  
Bild Raffael, 2018, Proceedings on Privacy Enhancing Technologies, V2018, P67, DOI 10.1515/popets-2018-0004
[4]  
[曹敏姿 Cao Minzi], 2018, [计算机科学, Computer Science], V45, P180
[5]   A decision-support framework for data anonymization with application to machine learning processes [J].
Caruccio, Loredana ;
Desiato, Domenico ;
Polese, Giuseppe ;
Tortora, Genoveffa ;
Zannone, Nicola .
INFORMATION SCIENCES, 2022, 613 :1-32
[6]   A survey on blockchain systems: Attacks, defenses, and privacy preservation [J].
Chen, Yourong ;
Chen, Hao ;
Zhang, Yang ;
Han, Meng ;
Siddula, Madhuri ;
Cai, Zhipeng .
HIGH-CONFIDENCE COMPUTING, 2022, 2 (02)
[7]   Miner revenue optimization algorithm based on Pareto artificial bee colony in blockchain network [J].
Chen, Yourong ;
Chen, Hao ;
Han, Meng ;
Liu, Banteng ;
Chen, Qiuxia ;
Ma, Zhenghua ;
Wang, Zhangquan .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
[8]   Background knowledge attacks in privacy-preserving data publishing models [J].
Desai, Nidhi ;
Das, Manik Lal ;
Chaudhari, Payal ;
Kumar, Naveen .
COMPUTERS & SECURITY, 2022, 122
[9]  
Dosselmann R., 2021, PHYS REV LETT, V5, pe202
[10]   On the privacy protection of indoor location dataset using anonymization [J].
Fathalizadeh, Amir ;
Moghtadaiee, Vahideh ;
Alishahi, Mina .
COMPUTERS & SECURITY, 2022, 117