Anatomy: Uncertain data k-anonymity privacy protection algorithm

被引:0
|
作者
Ren, Xiangmin [1 ]
Jia, Boxuan [2 ]
Wang, Kechao [1 ]
机构
[1] Harbin Univ, Sch Software, Harbin, Peoples R China
[2] Heilongjiang Univ, Coll Software, Harbin, Peoples R China
来源
ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3 | 2013年 / 433-435卷
关键词
uncertain data; privacy protection; UDAK-anonymity;
D O I
10.4028/www.scientific.net/AMM.433-435.1689
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Uncertain data management has become an important-research direction and a hot area of research. This paper proposes an UDAK-anonymity algorithm via anatomy for relational uncertain data. Uncertain data influence matrix based on background knowledge is built in order to describe the influence degree of sensitive attribute and Quasi-identifier(QI) attributes. We use generalization and BK(L,K)-clustering to present equivalent class, L makes sensitive attributes diversity in one equivalent class. Experimental results show that UDAK-anonymity algorithm are utility, effective and efficient, and can make anonymous uncertainty data effectively resist background knowledge attack and homogeneity attack.
引用
收藏
页码:1689 / +
页数:2
相关论文
共 50 条
  • [1] Research on uncertain data privacy protection based on K-anonymity
    Jing, Yang
    Xiangmin, Ren
    Jianpei, Zhang
    Kechao, Wang
    Jing, Y. (yangjing@hrbeu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04): : 140 - 149
  • [2] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [3] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    World Wide Web, 2021, 24 : 1551 - 1561
  • [4] Data privacy preservation algorithm with k-anonymity
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05): : 1551 - 1561
  • [5] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
  • [6] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [7] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [8] Methods for Privacy Protection Using K-Anonymity
    Sharma, Vijay
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
  • [9] Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity
    Sun, Hui
    Huang, Cheng
    Cheng, Xu
    Chen, Fulong
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 258 - 264
  • [10] K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks
    Su, Bing
    Huang, Jiaxuan
    Miao, Kelei
    Wang, Zhangquan
    Zhang, Xudong
    Chen, Yourong
    SENSORS, 2023, 23 (03)