首页> 外文会议>2011 IEEE Recent Advances in Intelligent Computational Systems >A fast p-sensitive l-diversity Anonymisation algorithm
【24h】

A fast p-sensitive l-diversity Anonymisation algorithm

机译:快速的p敏感l分集匿名算法

获取原文

摘要

Use of published organizational data for a variety of purposes has the chance of violation of leakage of individual secret information. Though this is taken care by the organizations by removal or encryption of explicit identifiers, valuable information may still be leaked by quasi identifiers in the released data. The concept of k-anonymity was introduced and several algorithms in this direction have been proposed by different researchers [1, 2, 3, 4, 5, 6, 7, 8, 11] to handle this problem. But the notion of k-anonymity is susceptible to two types of attacks which necessitated the requirement of a better privacy preserving notion leading to the proposal of l- diversity [6]. In [14] a third phase is added to the two phase clustering-based k-anonymisation algorithm OKA [4] to achieve l-diversity. Recently, the clustering stage of the algorithm has been improved in [14] and the diversity stage algorithm is improved in [16] to come up with a fast l-diversity algorithm which deals with a single sensitive attribute in a relational table. Our main contribution in this paper is to develop an l-diversity algorithm to handle multi-sensitive attributes in databases. Also, we shall improve the adjustment stage algorithm so that it becomes more efficient. We also analyse and provide enough reasons to show that though the second and third stages of the algorithm are not necessary in most of the cases, we cannot avoid using these two stages in some cases.
机译:将已发布的组织数据用于各种目的有可能违反个人机密信息的泄漏。尽管组织通过删除或加密显式标识符来对此加以注意,但有价值的信息仍可能会因已发布数据中的准标识符而泄漏。介绍了k-匿名性的概念,并由不同的研究人员[1、2、3、4、5、6、7、8、11]提出了该方向的几种算法来解决此问题。但是,k-匿名性的概念容易受到两种类型的攻击,这导致需要更好的隐私保护概念,从而导致提出了l-多样性[6]。在[14]中,将第三阶段添加到基于两阶段聚类的k匿名算法OKA [4]中,以实现l分集。最近,在[14]中改进了算法的聚类阶段,在[16]中改进了多样性阶段算法,以提出一种快速的l-多样性算法,该算法处理关系表中的单个敏感属性。我们在本文中的主要贡献是开发一种l-多样性算法来处理数据库中的多敏感属性。另外,我们将改进调整阶段算法,使其变得更有效率。我们还分析并提供了足够的理由,以表明尽管在大多数情况下该算法的第二阶段和第三阶段不是必需的,但在某些情况下我们无法避免使用这两个阶段。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号