DATA PRIVACY PROTECTION BASED ON SENSITIVE ATTRIBUTES DYNAMIC UPDATE

被引:0
|
作者
Liao, Jun [1 ]
Jiang, Chaohui [1 ]
Guo, Chun [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, Guiyang 550025, Peoples R China
来源
PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016) | 2016年
关键词
Privacy protection; Dynamic update; Sensitive attributes; M-invariance; Information loss; ANONYMITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Focused on the issue that the existing static data anonymous algorithm give dynamic data publication directly bring unexpected disclosure of private information frequently, based on the m-invariance model, an sensitive attribute of dynamic update for privacy preserving algorithm (SDUPPA)is proposed. The algorithm breaks the table down quasi-identifier and sensitive attribute in data re-publication, which effectively protects data privacy. At the same time, it adopts orderly random switching technology to disturb sensitive attributes, so that the attacker can not accurately distinguish individual sensitive attribute information. Because SDUPPA algorithm meets the m-invariance privacy protection requirement and takes local generalization for quasi-identifier attributes, which reduces the information loss of over anonymous processing. so to some extent ensured the data quality. Research and analysis through data quality show that the SDUPPA algorithm can efficiently reduce the information loss and improve data security of the algorithm in dynamic data update environment.
引用
收藏
页码:377 / 381
页数:5
相关论文
共 50 条
  • [21] Dynamic permission access control model based on privacy protection
    Qikun Zhang
    Liang Zhu
    Kunyuan Zhao
    Yimeng Wu
    Baohua Jin
    Jianyong Li
    Yinghui Meng
    Sikang Hu
    Telecommunication Systems, 2022, 81 : 191 - 205
  • [22] Cybersecurity of Medical Data Based on Big Data and Privacy Protection Method
    Li, Jianhong
    Pan, An
    Zheng, Tongxing
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2023, 19 (05)
  • [23] Privacy protection data publishing method for data privacy differences
    Yu Y.
    Zhou D.
    Li H.
    Wu X.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2020, 48 (09): : 57 - 63
  • [24] Dynamic permission access control model based on privacy protection
    Zhang, Qikun
    Zhu, Liang
    Zhao, Kunyuan
    Wu, Yimeng
    Jin, Baohua
    Li, Jianyong
    Meng, Yinghui
    Hu, Sikang
    TELECOMMUNICATION SYSTEMS, 2022, 81 (02) : 191 - 205
  • [25] A dynamic group privacy protection mechanism based on cloud model
    Zhai, Ruxiang
    Zhang, Kun
    Liu, Mingjun
    PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), 2015, : 83 - 88
  • [26] Entropy-driven differential privacy protection scheme based on social graphlet attributes
    Jing Zhang
    Zuan-yang Zeng
    Kun-liang Si
    Xiu-cai Ye
    The Journal of Supercomputing, 2024, 80 : 7399 - 7432
  • [27] Privacy Protection in Data Mining
    Fu, Chunchang
    Zhang, Nan
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 2, 2010, : 92 - 93
  • [28] Protection of Privacy in Biometric Data
    Natgunanathan, Iynkaran
    Mehmood, Abid
    Xiang, Yong
    Beliakov, Gleb
    Yearwood, John
    IEEE ACCESS, 2016, 4 : 880 - 892
  • [29] Entropy-driven differential privacy protection scheme based on social graphlet attributes
    Zhang, Jing
    Zeng, Zuan-yang
    Si, Kun-liang
    Ye, Xiu-cai
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (06) : 7399 - 7432
  • [30] Data Security and Privacy Protection Scheme Based on EC-ElGamal in Federal Learning
    Bin Liu
    Eric B. Blancaflor
    SN Computer Science, 6 (2)