Optimization algorithm for k-anonymization of datasets with low information loss

被引:0
|
作者
Keisuke Murakami
Takeaki Uno
机构
[1] Kansai University,
[2] National Institute of Informatics,undefined
关键词
Security and protection; Database models; -anonymity; Large-scale dataset; Graph problem; Optimization;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymization is the modification of data to mask the correspondence between a person and sensitive information in the data. Several anonymization models such as k-anonymity have been intensively studied. Recently, a new model with less information loss than existing models was proposed; this is a type of non-homogeneous generalization. In this paper, we present an alternative anonymization algorithm that further reduces the information loss using optimization techniques. We also prove that a modified dataset is checked whether it satisfies the k-anonymity by a polynomial-time algorithm. Computational experiments were conducted and demonstrated the efficiency of our algorithm even on large datasets.
引用
收藏
页码:631 / 644
页数:13
相关论文
共 50 条
  • [21] K-anonymization as spatial indexing: Toward scalable and incremental anonymization
    Iwuchukwu, Tochukwu
    DeWitt, David J.
    Doan, Anhai
    Naughton, Jeffrey F.
    2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2007, : 1389 - +
  • [22] Manhattan-based k-member clustering and enhanced rabbit optimization algorithm for k-anonymization in social network
    Sivasankari K.
    Maheswari K.M.U.
    Multimedia Tools and Applications, 2024, 83 (30) : 74739 - 74756
  • [23] Flexible sensitive K-anonymization on transactions
    Tsai, Yu-Chuan
    Wang, Shyue-Liang
    Ting, I-Hsien
    Hong, Tzung-Pei
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (04): : 2391 - 2406
  • [24] Frequent tables for fast K-anonymization
    Yang, Xiaochun
    Liu, Xiangyu
    Wang, Bin
    Yu, Ge
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1239 - 1242
  • [25] Evaluation of Generalization Based K-Anonymization Algorithms
    Patil, Devyani
    Mohapatra, Ramesh K.
    Babu, Korra Sathya
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 171 - 175
  • [26] Data privacy through optimal k-anonymization
    Bayardo, RJ
    Agrawal, R
    ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2005, : 217 - 228
  • [27] Secure k-Anonymization over Encrypted Databases
    Kesarwani, Manish
    Kaul, Akshar
    Braghin, Stefano
    Holohan, Naoise
    Antonatos, Spiros
    2021 IEEE 14TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2021), 2021, : 20 - 30
  • [28] Efficient systematic clustering method for k-anonymization
    Kabir, Md. Enamul
    Wang, Hua
    Bertino, Elisa
    ACTA INFORMATICA, 2011, 48 (01) : 51 - 66
  • [29] On Sampling, Anonymization, and Differential Privacy Or, K-Anonymization Meets Differential Privacy
    Li, Ninghui
    Qardaji, Wahbeh
    Su, Dong
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [30] Efficient systematic clustering method for k-anonymization
    Md. Enamul Kabir
    Hua Wang
    Elisa Bertino
    Acta Informatica, 2011, 48 : 51 - 66