Privacy preserving pattern based anonymity (k, P) anonymity in time series data

被引:0
|
作者
Mayil Vel Kumar, P. [1 ]
Karthikeyan, M. [1 ]
机构
[1] Anna University Chennai, India Tamilnadu College of Engineering, Coimbatore, India
关键词
Sensitive data - Privacy-preserving techniques - Time series analysis;
D O I
10.1166/jctn.2015.4560
中图分类号
学科分类号
摘要
Publishing data from a micro data table containing sensitive attributes, maintaining an individual privacy of that attributes is a difficult task. The k-anonymity model was proposed for privacy preserving data publication. Most of the existing anonymization techniques are used slicing concept in k-anonymity. Thus the Systematic approach used for anonymizing data improves the data utility as well as the quality of the privacy-utility tradeoff. However, in case of existing anonymization methods does not considered pattern based privacy protection of time series data for reduce the information loss and increase the privacy. To overcome this, the proposed system introduces a new anonymization model called pattern based (k, P)-anonymity which is used in time series data. A time series is a set of data regularly gathered at usual intervals for analysis. According to the sensitivity of the diseases the time series micro data table is partitioned into four categories. The proposed pattern based (k, P)-anonymity has two phase. On the first phase, k-anonymity is required for time series in the entire database. On the second phase, P-anonymity is required for the pattern representations associated with each record in a same group. This model publishes both the attribute values and the patterns of time series in separate data forms. Our experimental result shows that the proposed pattern based (k, P)-anonymity data preserve the pattern information for each time series. Copyright © 2015 American Scientific Publishers All rights reserved.
引用
收藏
页码:5524 / 5529
相关论文
共 50 条
  • [1] (k, ε, δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
    Tsou, Yao-Tung
    Alraja, Mansour Naser
    Chen, Li-Sheng
    Chang, Yu-Hsiang
    Hu, Yung-Li
    Huang, Yennun
    Yu, Chia-Mu
    Tsai, Pei-Yuan
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (03) : 175 - 185
  • [2] Attribute Based Anonymity for Preserving Privacy
    Adusumalli, Krishna
    Kumari, V. Valli
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 572 - 579
  • [3] A survey on anonymity for privacy preserving data mining
    Zhang, X. X.
    Liu, Q.
    Liu, D. M.
    Xie, W.
    INFORMATION SCIENCE AND ELECTRONIC ENGINEERING, 2017, : 343 - 346
  • [4] Anonymity-based Privacy Preserving Network Data Publication
    Liu, Peng
    Li, Yidong
    Sang, Yingpeng
    Zhang, Ji
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 823 - 828
  • [5] Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
    Sun, Xiaoxun
    Wang, Hua
    Li, Jiuyong
    Truta, Traian Marius
    TRANSACTIONS ON DATA PRIVACY, 2008, 1 (02) : 53 - 66
  • [6] A personalized k-anonymity privacy preserving method
    Xu, Yong
    Qin, Xiaolin
    Yang, Zhongxue
    Yang, Yitao
    Li, Kun
    Journal of Information and Computational Science, 2013, 10 (01): : 139 - 155
  • [7] Privacy-preserving distributed k-anonymity
    Jiang, W
    Clifton, C
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 166 - 177
  • [8] A Survey on Anonymity-based Privacy Preserving
    Wang, Jian
    Luo, Yongcheng
    Jiang, Shuo
    Le, Jiajin
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1073 - 1076
  • [9] An Improved (k, p, l)-Anonymity Method for Privacy Preserving Collaborative Filtering
    Wei, Ruoxuan
    Shen, Hong
    Tian, Hui
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [10] User k-anonymity for privacy preserving data mining of query logs
    Navarro-Arribas, Guillermo
    Torra, Vicenc
    Erola, Arnau
    Castella-Roca, Jordi
    INFORMATION PROCESSING & MANAGEMENT, 2012, 48 (03) : 476 - 487