Hybrid k-Anonymity

被引:17
|
作者
Nergiz, Mehmet Ercan [1 ]
Gok, Muhammed Zahit [1 ]
机构
[1] Zirve Univ, Dept Comp Engn, Gaziantep, Turkey
关键词
Privacy; Anonymization; Privacy-preserving databases; k-anonymity; Utility in data publishing; ANONYMIZATION;
D O I
10.1016/j.cose.2014.03.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymization-based privacy protection ensures that published data cannot be linked back to an individual. The most common approach in this domain is to apply generalizations on the private data in order to maintain a privacy standard such as k-anonymity. While generalization-based techniques preserve truthfulness, relatively small output space of such techniques often results in unacceptable utility loss especially when privacy requirements are strict. In this paper, we introduce the hybrid generalizations which are formed by not only generalizations but also the data relocation mechanism. Data relocation involves changing certain data cells to further populate small groups of tuples that are indistinguishable with each other. This allows us to create anonymizations of finer granularity confirming to the underlying privacy standards. Data relocation serves as a tradeoff between utility and truthfulness and we provide an input parameter to control this tradeoff. Experiments on real data show that allowing a relatively small number of relocations increases utility with respect to heuristic metrics and query answering accuracy. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:51 / 63
页数:13
相关论文
共 50 条
  • [1] Multirelational k-Anonymity
    Nergiz, Mehmet Ercan
    Clifton, Christopher
    Nergiz, Ahmet Erhan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (08) : 1104 - 1117
  • [2] Multirelational k-anonymity
    Nergiz, M. Ercan
    Clifton, Chris
    Nergiz, A. Ethan
    2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2007, : 1392 - +
  • [3] k-anonymity Diagnosis Centre
    Mirakabad, Mohammad Reza Zare
    Jantan, Aman
    Bressan, Stephane
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (01): : 47 - 63
  • [4] An Improved Algorithm for K-anonymity
    Zhang, Jing
    Gong, Xiujun
    Han, Zhipeng
    Feng, Siling
    Communications in Computer and Information Science, 2013, 332 : 352 - 360
  • [5] k-anonymity: risks and the reality
    Basu, Anirban
    Nakamura, Toru
    Hidano, Seira
    Kiyomoto, Shinsaku
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 983 - 989
  • [6] K-Anonymity for Crowdsourcing Database
    Wu, Sai
    Wang, Xiaoli
    Wang, Sheng
    Zhang, Zhenjie
    Tung, Anthony K. H.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (09) : 2207 - 2221
  • [7] An Improved Algorithm for K-anonymity
    Zhang, Jing
    Gong, Xiujun
    Han, Zhipeng
    Feng, Siling
    CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 352 - +
  • [8] The k-Anonymity Problem Is Hard
    Bonizzoni, Paola
    Della Vedova, Gianluca
    Dondi, Riccardo
    FUNDAMENTALS OF COMPUTATION THEORY, PROCEEDINGS, 2009, 5699 : 26 - +
  • [9] Semantic integrity and K-anonymity
    Huang, Liming
    Song, Jinling
    Gao, Yan
    Cai, Qianying
    Computer Modelling and New Technologies, 2014, 18 (12): : 282 - 288
  • [10] Towards Flexible K-Anonymity
    Kilany, Rima
    Sokhn, Maria
    Hellani, Hussein
    Shabani, Shaban
    KNOWLEDGE ENGINEERING AND SEMANTIC WEB, KESW 2016, 2016, 649 : 288 - 297