An Enhanced Method for Privacy Preservation in Data Publishing

被引:0
作者
Thomas, Christy [1 ]
Thomas, Diya [1 ]
机构
[1] Rajagiri Sch Engn & Technol, Dept Comp Sci & Engn, Kochi, Kerala, India
来源
2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT) | 2013年
关键词
K-Anonymity; L-Diversity; T-Closeness; !text type='JS']JS[!/text]-Reduce;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-maintaining data release is one of the most important challenges in an information system, because of the wide collection of sensitive information on the internet. A number of solutions have been designed for privacy-maintaining data release. This paper provides an inspection of the state-of-the-art methods for privacy protection. The paper discusses novel and powerful privacy definitions which can be categorized into microdata anonymity methods and differential privacy methods for privacy-maintaining data release. The methods include k-anonymity, l-diversity, t-closeness and js-reduce defense. This paper proposes an enhanced method which will prevents sequential background knowledge attack and provides some anonymization also.
引用
收藏
页数:5
相关论文
共 10 条
  • [1] Ciriani V., 2007, ADV INFORM SECURITY
  • [2] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
  • [3] On-chip continuous blood cell sub-type separation by deterministic lateral displacement
    Li, Nan
    Kamei, Daniel T.
    Ho, Chili-Ming
    [J]. 2007 2ND IEEE INTERNATIONAL CONFERENCE ON NANO/MICRO ENGINEERED AND MOLECULAR SYSTEMS, VOLS 1-3, 2007, : 692 - +
  • [4] Li TC, 2009, PROC INT CONF DATA, P6, DOI 10.1109/ICDE.2009.86
  • [5] DIVERGENCE MEASURES BASED ON THE SHANNON ENTROPY
    LIN, JH
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1991, 37 (01) : 145 - 151
  • [6] Machanavajjhala Ashwin, 2007, ACM T KNOWL DISCOV
  • [7] Meyerson Adam, 2004, P TWENTYTHIRD ACM SI, P223
  • [8] Riboni D., 2012, IEEE T DEPEND SECURE, V9, P400
  • [9] JS']JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks
    Riboni, Daniele
    Pareschi, Linda
    Bettini, Claudio
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) : 387 - 400
  • [10] k-anonymity:: A model for protecting privacy
    Sweeney, L
    [J]. INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570