KAB: A new k-anonymity approach based on black hole algorithm
نویسندگان
چکیده
K-anonymity is the most widely used approach to privacy preserving microdata which mainly based on generalization. Although generalization-based k-anonymity approaches can achieve protection objective, they suffer from information loss. Clustering-based have been successfully adapted for k-anonymization as enhance data quality, however, computational complexity of finding an optimal solution has shown NP-hard. Nature-inspired optimization algorithms are effective in solutions complex problems. We propose, this paper, a novel algorithm simple nature-inspired metaheuristic called Black Hole Algorithm (BHA), address such limitations. Experiments real set show that utility improved by our compared k-anonymity, BHA-based and clustering-based approaches.
منابع مشابه
An Algorithm for k-Anonymity-Based Fingerprinting
The anonymization of sensitive microdata (e.g. medical health records) is a widely-studied topic in the research community. A still unsolved problem is the limited informative value of anonymized microdata that often rules out further processing (e.g. statistical analysis). Thus, a tradeoff between anonymity and data precision has to be made, resulting in the release of partially anonymized mic...
متن کاملBlack hole: A new heuristic optimization approach for data clustering
0020-0255/$ see front matter 2012 Elsevier Inc http://dx.doi.org/10.1016/j.ins.2012.08.023 ⇑ Address: Islamic Azad University, Khoy Branch, E-mail addresses: [email protected], hatam Nature has always been a source of inspiration. Over the last few decades, it has stimulated many successful algorithms and computational tools for dealing with complex and optimization problems. This paper pr...
متن کاملClustering Based K-anonymity Algorithm for Privacy Preservation
K-anonymity is an effective model for protecting privacy while publishing data, which can be implemented by different ways. Among them, local generalization are popular because of its low information loss. But such algorithms are generally computation expensive making it difficult to perform well in the case of large amount of data. In order to solve this problem, this paper proposes a clusteri...
متن کاملAn efficient hash-based algorithm for minimal k-anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes of microdata that clearly identify individuals, such as name and medical care card number, are generally removed, these databases can sometimes be joined with other public databases on attributes such as Zip code, Gender and Age to reidentify individuals who were supposed...
متن کاملAn Alternative Approach to k-Anonymity for Location-Based Services
Users of location-based services (LBSs) may have serious privacy concerns when using these technologies since their location can be utilized by adversaries to infer privacy-sensitive information about them. In this work, we analyze the mainstream anonymity solutions proposed for LBSs based on k-anonymity, and point out that these do not follow the safe assumptions as per the original definition...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of King Saud University - Computer and Information Sciences
سال: 2022
ISSN: ['2213-1248', '1319-1578']
DOI: https://doi.org/10.1016/j.jksuci.2021.04.014