An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data

被引:1
|
作者
Yuan, Linlin [1 ,2 ]
Zhang, Tiantian [1 ,3 ]
Chen, Yuling [1 ]
Yang, Yuxiang [1 ]
Li, Huang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Guizhou Open Univ, Coll Informat Engn, Guiyang 550023, Peoples R China
[3] Guizhou Acad Tobacco Sci, Guiyang, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 01期
关键词
Blockchain; big data; K-anonymity; 2-means clustering; greedy algorithm; mean-center method; MODEL;
D O I
10.32604/cmc.2023.046907
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of technologies such as big data and blockchain has brought convenience to life, but at the same time, privacy and security issues are becoming more and more prominent. The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users' privacy by anonymizing big data. However, the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability. In addition, ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced. Based on this, we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data, while guaranteeing improved data usability. Specifically, we construct a new information loss function based on the information quantity theory. Considering that different quasi-identification attributes have different impacts on sensitive attributes, we set weights for each quasi-identification attribute when designing the information loss function. In addition, to reduce information loss, we improve K-anonymity in two ways. First, we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms, i.e., greedy algorithm and 2-means clustering algorithm. In addition, we improve the 2means clustering algorithm by designing a mean-center method to select the initial center of mass. Meanwhile, we design the K-anonymity algorithm of this scheme based on the constructed information loss function, the improved 2-means clustering algorithm, and the greedy algorithm, which reduces the information loss. Finally, we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss.
引用
收藏
页码:1561 / 1579
页数:19
相关论文
共 50 条
  • [1] (k, ε, δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
    Tsou, Yao-Tung
    Alraja, Mansour Naser
    Chen, Li-Sheng
    Chang, Yu-Hsiang
    Hu, Yung-Li
    Huang, Yennun
    Yu, Chia-Mu
    Tsai, Pei-Yuan
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (03) : 175 - 185
  • [2] Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing
    Liu, Peng
    Bai, Yan
    Wang, Lie
    Li, Xianxian
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2017, 27 (01) : 71 - 90
  • [3] K-anonymity privacy-preserving data sharing for a dynamic game scheme
    Cao, Laicheng
    Hou, Yangning
    Feng, Tao
    Guo, Xian
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (04): : 170 - 179
  • [4] Privacy-preserving distributed k-anonymity
    Jiang, W
    Clifton, C
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 166 - 177
  • [5] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    World Wide Web, 2021, 24 : 1551 - 1561
  • [6] Data privacy preservation algorithm with k-anonymity
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05): : 1551 - 1561
  • [7] K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing
    Ling, Chen
    Zhang, Weizhe
    He, Hui
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (02): : 1495 - 1510
  • [8] K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing
    Chen Ling
    Weizhe Zhang
    Hui He
    Cluster Computing, 2023, 26 : 1495 - 1510
  • [9] User k-anonymity for privacy preserving data mining of query logs
    Navarro-Arribas, Guillermo
    Torra, Vicenc
    Erola, Arnau
    Castella-Roca, Jordi
    INFORMATION PROCESSING & MANAGEMENT, 2012, 48 (03) : 476 - 487
  • [10] Anatomy: Uncertain data k-anonymity privacy protection algorithm
    Ren, Xiangmin
    Jia, Boxuan
    Wang, Kechao
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1689 - +