Optimization algorithm for k-anonymization of datasets with low information loss

被引:0
|
作者
Keisuke Murakami
Takeaki Uno
机构
[1] Kansai University,
[2] National Institute of Informatics,undefined
关键词
Security and protection; Database models; -anonymity; Large-scale dataset; Graph problem; Optimization;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymization is the modification of data to mask the correspondence between a person and sensitive information in the data. Several anonymization models such as k-anonymity have been intensively studied. Recently, a new model with less information loss than existing models was proposed; this is a type of non-homogeneous generalization. In this paper, we present an alternative anonymization algorithm that further reduces the information loss using optimization techniques. We also prove that a modified dataset is checked whether it satisfies the k-anonymity by a polynomial-time algorithm. Computational experiments were conducted and demonstrated the efficiency of our algorithm even on large datasets.
引用
收藏
页码:631 / 644
页数:13
相关论文
共 50 条
  • [41] Handicapping attacker's confidence:: an alternative to k-anonymization
    Wang, Ke
    Fung, Benjamin C. M.
    Yu, Philip S.
    KNOWLEDGE AND INFORMATION SYSTEMS, 2007, 11 (03) : 345 - 368
  • [42] The K-Anonymization Method Satisfying Personalized Privacy Preservation
    Song, Jinling
    Huang, Liming
    Wang, Gang
    Kang, Yan
    Liu, Haibin
    IAEDS15: INTERNATIONAL CONFERENCE IN APPLIED ENGINEERING AND MANAGEMENT, 2015, 46 : 181 - 186
  • [43] A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners
    Ayala-Rivera, Vanessa
    McDonagh, Patrick
    Cerqueus, Thomas
    Murphy, Liam
    TRANSACTIONS ON DATA PRIVACY, 2014, 7 (03) : 337 - 370
  • [44] A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining
    Bhaladhare, Pawan R.
    Jinwala, Devesh C.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (01) : 45 - 65
  • [45] k-Anonymization without Q-S associations
    Yang, Weijia
    Huang, Shangteng
    ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2007, 4505 : 753 - +
  • [46] Plausible Heterogeneous Graph k-Anonymization for Social Networks
    Kaiyang Li
    Ling Tian
    Xu Zheng
    Bei Hui
    Tsinghua Science and Technology, 2022, 27 (06) : 912 - 924
  • [47] Definition and Efficient Construction of Encrypted k-anonymization Scheme
    Yoshino, Masayuki
    Suzuki, Takayuki
    Naganuma, Ken
    Sato, Hisayoshi
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 293 - 300
  • [48] Efficient k-Anonymization through Constrained Collaborative Clustering
    Zouinina, Sarah
    Grozavu, Nistor
    Bennani, Younes
    Lyhyaoui, Abdelouahid
    Rogovschi, Nicoleta
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 405 - 411
  • [49] High utility K-anonymization for social network publishing
    Wang, Yazhe
    Xie, Long
    Zheng, Baihua
    Lee, Ken C. K.
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (03) : 697 - 725
  • [50] An Improved K-anonymization Approach for Preserving Graph Structural Properties
    Hanafy, A. Mohammed
    Barakat, Sherif
    Rezk, Amira
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (09) : 199 - 207