P-Sensitive K-Anonymity with Generalization Constraints
نویسندگان
چکیده
Numerous privacy models based on the k‐anonymity property and extending the k‐anonymity model have been introduced in the last few years in data privacy re‐ search: l‐diversity, p‐sensitive k‐anonymity, (α, k) – anonymity, t‐closeness, etc. While differing in their methods and quality of their results, they all focus first on masking the data, and then protecting the quality of the data as a whole. We consider a new ap‐ proach, where requirements on the amount of distortion allowed on the initial data are imposed in order to preserve its usefulness. Our approach consists of specifying quasi‐ identifiers' generalization constraints, and achieving p‐sensitive k‐anonymity within the imposed constraints. We think that limiting the amount of allowed generalization when masking microdata is indispensable for real life datasets and applications. In this paper, the constrained p‐sensitive k‐anonymity model is introduced and an algorithm for generat‐ ing constrained p‐sensitive k‐anonymous microdata is presented. Our experiments have shown that the proposed algorithm is comparable with existing algorithms used for generating p‐sensitive k‐anonymity with respect to the results' quality, and obviously the obtained masked microdata complies with the generalization constraints as indi‐ cated by the user.
منابع مشابه
An Enhanced K-Anonymity Model against Homogeneity Attack
k-anonymity is an important model in the field of privacy protection and it is an effective method to prevent privacy disclosure in micro-data release. However, it is ineffective for the attribute disclosure by the homogeneity attack. The existing models based on k-anonymity have solved this problem to a certain extent, but they did not distinguish the different values of the sensitive attribut...
متن کاملWp.8 English Only United Nations Statistical Commission and Economic Commission for Europe Conference of European Statisticians European Commission Statistical Office of the European Communities (eurostat) Joint Unece/eurostat Work Session on Statistical Data Confidentiality Microaggregation Heuristics for P-sensitive K-anonymity
p-Sensitive k-anonymity is a sophistication of k-anonymity requiring that there be at least p different values for each confidential attribute within the records sharing a combination of key attributes. Like for k-anonymity, the computational approach originally proposed to achieve this property is based on generalization and suppression; this has several data utility problems, such as turning ...
متن کاملA Novel Anonymity Algorithm for Privacy Preserving in Publishing Multiple Sensitive Attributes
Publishing the data with multiple sensitive attributes brings us greater challenge than publishing the data with single sensitive attribute in the area of privacy preserving. In this study, we propose a novel privacy preserving model based on k-anonymity called (α, β, k)-anonymity for databases. (α, β, k)anonymity can be used to protect data with multiple sensitive attributes in data publishing...
متن کاملA novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks
Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a dest...
متن کاملA Clustering Approach for Achieving Data Privacy
New privacy regulations together with everincreasing data availability and computational power have created a huge interest in data privacy research. One major research direction is built around k-anonymity property and its extensions, which are required for the released data. In this paper we present such an extension to k-anonymity, called psensitive k-anonymity, which solves some of the weak...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Trans. Data Privacy
دوره 3 شماره
صفحات -
تاریخ انتشار 2010