Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions

被引:10
|
作者
Qian, Jin [1 ,3 ]
Jiang, Haoying [1 ]
Yu, Ying [1 ]
Wang, Hui [1 ]
Miao, Duoqian [1 ,2 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
[2] Tongji Univ, Dept Comp Sci & Technol, Shanghai 201804, Peoples R China
[3] Jiangsu Univ Sci & Technol, Sch Comp, Zhenjiang 212003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Decision-theoretic rough set; Sequential three-way decisions; K-anonymity; Personalized anonymity; Privacy preservation; ROUGH SETS;
D O I
10.1016/j.eswa.2023.122343
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
K-anonymity is a widely used privacy-preserving technique which defends against linking attacks by suppres-sion and generalization. The existing k-anonymity algorithms prevent attackers from illegally obtaining private information by constraining at least k records in an equivalence group. However, this unified anonymity method ignores individual differences and leads to a large amount of information loss. To this end, we introduce sequential three-way decisions into k-anonymity, using a dynamic k-value sequence instead of the fixed k-value to achieve personalized k-anonymity. Specifically, we first construct a hierarchical decision table for k-anonymity by attribute generalization trees and sensitive decision values provided with users. Then, we propose a multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions, where we anonymize the partitioning granular data with a dynamic k-value sequence, respectively. Furthermore, we present three practical algorithms to implement the proposed model and discuss the differences between them. Finally, the experimental results demonstrate that the proposed model not only provides a more flexible anonymization method to achieve personalized anonymity, but greatly reduces the information loss. This study provides a complete framework for multi-level privacy protection and enriches the application of sequential three-way decisions.
引用
收藏
页数:16
相关论文
共 50 条
  • [11] A Practical Privacy-Preserving Publishing Mechanism Based on Personalized k-Anonymity and Temporal Differential Privacy for Wearable IoT Applications
    Guo, Junqi
    Yang, Minghui
    Wan, Boxin
    SYMMETRY-BASEL, 2021, 13 (06):
  • [12] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
    Wang, Hui
    Huang, Haiping
    Qin, Yuxiang
    Wang, Yunqi
    Wu, Min
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2017, 6 (06)
  • [13] Personalized extended (α, k)-anonymity model for privacy-preserving data publishing
    Liu, Xiangwen
    Xie, Qingqing
    Wang, Liangmin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (06):
  • [14] A k-anonymity privacy-preserving approach in wireless medical monitoring environments
    Belsis, Petros
    Pantziou, Grammati
    PERSONAL AND UBIQUITOUS COMPUTING, 2014, 18 (01) : 61 - 74
  • [15] Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing
    Liu, Peng
    Bai, Yan
    Wang, Lie
    Li, Xianxian
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2017, 27 (01) : 71 - 90
  • [16] A k-anonymity privacy-preserving approach in wireless medical monitoring environments
    Petros Belsis
    Grammati Pantziou
    Personal and Ubiquitous Computing, 2014, 18 : 61 - 74
  • [17] K-anonymity privacy-preserving data sharing for a dynamic game scheme
    Cao, Laicheng
    Hou, Yangning
    Feng, Tao
    Guo, Xian
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (04): : 170 - 179
  • [18] A Clustering K-Anonymity Privacy-Preserving Method for Wearable IoT Devices
    Liu, Fang
    Li, Tong
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [19] K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing
    Ling, Chen
    Zhang, Weizhe
    He, Hui
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (02): : 1495 - 1510
  • [20] K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing
    Chen Ling
    Weizhe Zhang
    Hui He
    Cluster Computing, 2023, 26 : 1495 - 1510