Optimization algorithm for k-anonymization of datasets with low information loss

被引:0
|
作者
Keisuke Murakami
Takeaki Uno
机构
[1] Kansai University,
[2] National Institute of Informatics,undefined
关键词
Security and protection; Database models; -anonymity; Large-scale dataset; Graph problem; Optimization;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymization is the modification of data to mask the correspondence between a person and sensitive information in the data. Several anonymization models such as k-anonymity have been intensively studied. Recently, a new model with less information loss than existing models was proposed; this is a type of non-homogeneous generalization. In this paper, we present an alternative anonymization algorithm that further reduces the information loss using optimization techniques. We also prove that a modified dataset is checked whether it satisfies the k-anonymity by a polynomial-time algorithm. Computational experiments were conducted and demonstrated the efficiency of our algorithm even on large datasets.
引用
收藏
页码:631 / 644
页数:13
相关论文
共 50 条
  • [31] Efficient k-anonymization using clustering techniques
    Byun, Ji-Won
    Kamra, Ashish
    Bertino, Elisa
    Li, Ninghui
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 188 - +
  • [32] MMMs-induced k-member Co-clustering for k-anonymization of Cooccurrence Information
    Honda, Katsuhiro
    Sakamoto, Hikaru
    Ubukata, Seiki
    Notsu, Akira
    2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2016, : 2961 - 2966
  • [33] Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization
    Kotra, Anuraag
    Eldosouky, AbdelRahman
    Sengupta, Shamik
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING (ICACCE-2020), 2020,
  • [34] Privacy Preservation by k-Anonymization of Weighted Social Networks
    Skarkala, Maria E.
    Maragoudakis, Manolis
    Gritzalis, Stefanos
    Mitrou, Lilian
    Toivonen, Hannu
    Moen, Pirjo
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 423 - 428
  • [35] Utility-Oriented K-Anonymization on Social Networks
    Wang, Yazhe
    Xie, Long
    Zheng, Baihua
    Lee, Ken C. K.
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT I, 2011, 6587 : 78 - +
  • [36] An efficient generalized clustering method for achieving k-anonymization
    Xu, Xiaoshuang
    Numao, Masayuki
    PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 499 - 502
  • [37] High utility K-anonymization for social network publishing
    Yazhe Wang
    Long Xie
    Baihua Zheng
    Ken C. K. Lee
    Knowledge and Information Systems, 2014, 41 : 697 - 725
  • [38] Evaluating the impact of k-anonymization on the inference of interaction networks
    Rijo, Pedro
    Francisco, Alexandre P.
    Silva, Mario J.
    TRANSACTIONS ON DATA PRIVACY, 2016, 9 (01) : 49 - 72
  • [39] Handicapping attacker's confidence: an alternative to k-anonymization
    Ke Wang
    Benjamin C. M. Fung
    Philip S. Yu
    Knowledge and Information Systems, 2007, 11 : 345 - 368
  • [40] A Hybrid Method For K-Anonymization Using Clustering Technique
    Abd Rahim, Yahaya
    Sahib, Shahrin
    Abd Ghani, Mohd Khanapi
    Yaacob, AsrulHadi
    2011 INTERNATIONAL CONFERENCE ON AEROSPACE ENGINEERING AND INFORMATION TECHNOLOGY (AEIT 2011), 2011, : 17 - 20