Approximate algorithms with generalizing attribute values for k-anonymity

被引:12
作者
Park, Hyoungmin [1 ]
Shim, Kyuseok [1 ]
机构
[1] Seoul Natl Univ, Sch Elect Engn & Comp Sci, Seoul, South Korea
关键词
Privacy preservation; Anonymity; Data publishing; Data mining; Local recoding;
D O I
10.1016/j.is.2010.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When a table containing individual data is published, disclosure of sensitive information should be prohibitive. Since simply removing identifiers such as name and social security number may reveal the sensitive information by linking attacks which joins the published table with other tables on some attributes, the notion of k-anonymity which makes each record in the table be indistinguishable with k-1 other records by suppression or generalization has been proposed previously. It is shown to be NP-hard to k-anonymize a table minimizing information loss. The approximation algorithms with up to O(k) approximation ratio were proposed when generalization is used for anonymization. In this paper, we propose several approximation algorithms for k-anonymity with generalizing the attribute values by hierarchies that guarantee O(logk) approximation ratio and perform significantly better than the traditional algorithms. Since suppression of attributes is a special case of generalization of attributes with the hierarchies of two-level trees where the root nodes are '*' character, our approximation result works also for suppression methods. We next provide O(beta logk) approximate algorithms which gracefully adjust their running time according to the tolerance beta(>= 1) of the approximation ratios. We also present the approximate algorithms for both k-anonymity and C diversity with generalizing the attribute values by hierarchies. Experimental results confirm that our approximation algorithms perform significantly etter than traditional approximation algorithms. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:933 / 955
页数:23
相关论文
共 18 条
[1]  
AGGARWAL G, 2005, ICDT, P246
[2]  
AGGARWAL G, 2006, VLDB
[3]  
Aggarwal Gagan, 2005, Journal of Privacy Technology (JOPT)
[4]  
Agrawal R., 1994, P 20 INT C VER LARG, P487, DOI DOI 10.5555/645920.672836
[5]  
[Anonymous], 2005, VLDB, DOI DOI 10.5555/1083592.1083696
[6]  
Bayardo RJ, 2005, PROC INT CONF DATA, P217
[7]  
Cormen T., 2001, Introduction to Algorithms
[8]  
HAN J, 2000, P 2000 ACM SIGMOD IN, P1, DOI DOI 10.1145/342009.335372
[9]   APPROXIMATION ALGORITHMS FOR COMBINATORIAL PROBLEMS [J].
JOHNSON, DS .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1974, 9 (03) :256-278
[10]  
LeFevre K, 2005, P 2005 ACM SIGMOD IN, DOI [10.1145/1066157.1066164, DOI 10.1145/1066157.1066164]