Privacy preserving pattern based anonymity (k, P) anonymity in time series data

被引:0
|
作者
Mayil Vel Kumar, P. [1 ]
Karthikeyan, M. [1 ]
机构
[1] Anna University Chennai, India Tamilnadu College of Engineering, Coimbatore, India
关键词
Sensitive data - Privacy-preserving techniques - Time series analysis;
D O I
10.1166/jctn.2015.4560
中图分类号
学科分类号
摘要
Publishing data from a micro data table containing sensitive attributes, maintaining an individual privacy of that attributes is a difficult task. The k-anonymity model was proposed for privacy preserving data publication. Most of the existing anonymization techniques are used slicing concept in k-anonymity. Thus the Systematic approach used for anonymizing data improves the data utility as well as the quality of the privacy-utility tradeoff. However, in case of existing anonymization methods does not considered pattern based privacy protection of time series data for reduce the information loss and increase the privacy. To overcome this, the proposed system introduces a new anonymization model called pattern based (k, P)-anonymity which is used in time series data. A time series is a set of data regularly gathered at usual intervals for analysis. According to the sensitivity of the diseases the time series micro data table is partitioned into four categories. The proposed pattern based (k, P)-anonymity has two phase. On the first phase, k-anonymity is required for time series in the entire database. On the second phase, P-anonymity is required for the pattern representations associated with each record in a same group. This model publishes both the attribute values and the patterns of time series in separate data forms. Our experimental result shows that the proposed pattern based (k, P)-anonymity data preserve the pattern information for each time series. Copyright © 2015 American Scientific Publishers All rights reserved.
引用
收藏
页码:5524 / 5529
相关论文
共 50 条
  • [21] Anonymity preserving pattern discovery
    Maurizio Atzori
    Francesco Bonchi
    Fosca Giannotti
    Dino Pedreschi
    The VLDB Journal, 2008, 17 : 703 - 727
  • [22] Adaptive k-Anonymity Approach for Privacy Preserving in Cloud
    Karuna Arava
    Sumalatha Lingamgunta
    Arabian Journal for Science and Engineering, 2020, 45 : 2425 - 2432
  • [23] Survey of Anonymity Techniques for Privacy Preserving
    Luo Yongcheng
    Le Jiajin
    Wang Jian
    COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 248 - 252
  • [24] Privacy preserving data publishing of categorical data through k-anonymity and feature selection
    Aristodimou, Aristos
    Antoniades, Athos
    Pattichis, Constantinos S.
    HEALTHCARE TECHNOLOGY LETTERS, 2016, 3 (01) : 16 - 21
  • [25] Personalized SensitiveAttribute Anonymity based on P - Sensitive k Anonymity
    Jia, Jun-jie
    Yan, Guo-lei
    Xing, Li-cheng
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION PROCESSING (ICIIP'16), 2016,
  • [26] Mobile agents: Preserving privacy and anonymity
    Zwierko, A
    Kotulski, Z
    INTELLIGENT MEDIA TECHNOLOGY FOR COMMUNICATIVE INTELLIGENCE, 2005, 3490 : 246 - +
  • [27] Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing
    Liu, Peng
    Bai, Yan
    Wang, Lie
    Li, Xianxian
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2017, 27 (01) : 71 - 90
  • [28] K-anonymity privacy-preserving data sharing for a dynamic game scheme
    Cao, Laicheng
    Hou, Yangning
    Feng, Tao
    Guo, Xian
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (04): : 170 - 179
  • [29] Differential Privacy and k -Anonymity-Based Privacy Preserving Data Publishing Scheme With Minimal Loss of Statistical Information
    Majeed, Abdul
    Hwang, Seong Oun
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (03) : 3753 - 3765
  • [30] K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments
    Burke, Mark-John
    Kayem, Anne V. D. M.
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 833 - 840