Privacy preserving pattern based anonymity (k, P) anonymity in time series data

被引:0
|
作者
Mayil Vel Kumar, P. [1 ]
Karthikeyan, M. [1 ]
机构
[1] Anna University Chennai, India Tamilnadu College of Engineering, Coimbatore, India
关键词
Sensitive data - Privacy-preserving techniques - Time series analysis;
D O I
10.1166/jctn.2015.4560
中图分类号
学科分类号
摘要
Publishing data from a micro data table containing sensitive attributes, maintaining an individual privacy of that attributes is a difficult task. The k-anonymity model was proposed for privacy preserving data publication. Most of the existing anonymization techniques are used slicing concept in k-anonymity. Thus the Systematic approach used for anonymizing data improves the data utility as well as the quality of the privacy-utility tradeoff. However, in case of existing anonymization methods does not considered pattern based privacy protection of time series data for reduce the information loss and increase the privacy. To overcome this, the proposed system introduces a new anonymization model called pattern based (k, P)-anonymity which is used in time series data. A time series is a set of data regularly gathered at usual intervals for analysis. According to the sensitivity of the diseases the time series micro data table is partitioned into four categories. The proposed pattern based (k, P)-anonymity has two phase. On the first phase, k-anonymity is required for time series in the entire database. On the second phase, P-anonymity is required for the pattern representations associated with each record in a same group. This model publishes both the attribute values and the patterns of time series in separate data forms. Our experimental result shows that the proposed pattern based (k, P)-anonymity data preserve the pattern information for each time series. Copyright © 2015 American Scientific Publishers All rights reserved.
引用
收藏
页码:5524 / 5529
相关论文
共 50 条
  • [31] Privacy Preserving Sensitive Data Publishing using (k,n,m) Anonymity Approach
    Victor, Nancy
    Lopez, Daphne
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2020, 16 (01) : 46 - 56
  • [32] Clustering-based privacy preserving anonymity approach for table data sharing
    Piao, Chunhui
    Liu, Liping
    Shi, Yajuan
    Jiang, Xuehong
    Song, Ning
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2020, 11 (04) : 768 - 773
  • [33] Anonymity-Based Privacy-Preserving Data Reporting for Participatory Sensing
    Yao, Yonglei
    Yang, Laurence T.
    Xiong, Neal N.
    IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (05): : 381 - 390
  • [34] A New Anonymity Model for Privacy-Preserving Data Publishing
    Huang Xuezhen
    Liu Jiqiang
    Han Zhen
    Yang Jun
    CHINA COMMUNICATIONS, 2014, 11 (09) : 47 - 59
  • [35] Anonymity-based Data Publishing for Preserving Customer Privacy in Railway Systems
    Li, Yidong
    Yumeng, A.
    Li, Huifang
    Dong, Hairong
    2016 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT RAIL TRANSPORTATION (ICIRT), 2016, : 186 - 190
  • [36] Clustering-based privacy preserving anonymity approach for table data sharing
    Chunhui Piao
    Liping Liu
    Yajuan Shi
    Xuehong Jiang
    Ning Song
    International Journal of System Assurance Engineering and Management, 2020, 11 : 768 - 773
  • [37] On the privacy offered by (k, δ)-anonymity
    Trujillo-Rasua, Rolando
    Domingo-Ferrer, Josep
    INFORMATION SYSTEMS, 2013, 38 (04) : 491 - 494
  • [38] Research on uncertain data privacy protection based on K-anonymity
    Jing, Yang
    Xiangmin, Ren
    Jianpei, Zhang
    Kechao, Wang
    Jing, Y. (yangjing@hrbeu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04): : 140 - 149
  • [39] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    World Wide Web, 2021, 24 : 1551 - 1561
  • [40] K-Anonymity Based Approach For Privacy-Preserving Web Service Selection
    Ammar, Nariman
    Malik, Zaki
    Medjahed, Brahim
    Alodib, Mohammed
    2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, : 281 - 288