吉林大学学报(工学版) ›› 2013, Vol. 43 ›› Issue (01): 179-185.

Previous Articles     Next Articles

Entropy-based classification approach for personalized privacy anonymity

WANG Bo1,2, YANG Jing1, ZHANG Jian-pei1   

  1. 1. College of Computer Science and Technology, Harbin Engineering University, Harbin 150000, China;
    2. School of Automation, Harbin University of Science and Technology, Harbin 150080, China
  • Received:2011-11-14 Online:2013-01-01 Published:2013-01-01

Abstract: To solve the defects of the traditional (α, k)-anonymity model has the defect that it does not satisfy the personalized requirement of different privacy preserving degree for different sensitive attributed values. To overcome this defect, the concepts of personalized privacy sensitive factor and personalized privacy preserving requirement degrees for each sensitive attribute value are introduced. Then the personalized (α, k)-anonymity model is defined formally. Meanwhile, an entropy-based classification approach for personalized privacy anonymity is presented to solve this personalized (α, k)-anonymity model. Experiment results show that the proposed method not only produces similar information loss and time cost to the existing (α, k)-anonymity algorithm, but also meets the requirements of personalized service and achieves more reasonable privacy preservation.

Key words: computer application, privacy preserving, (&alpha, , k)-anonymity, entropy classification, personalized

CLC Number: 

  • TP393
[1] Sweenty L. k-anonymity: a model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10(5): 557-570.

[2] Machanavajjhala A, Kifer D, Gehrke J, et al. l-diversity: privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data, 2007, 1(1):1-52.

[3] Li N H, Li T C, Venkatasubramanian S. t-closeness: privacy beyond k-anonymity and l-diversity//Proceedings of the 23rd IEEE International Conference on Data Engineering, 2007: 106-115.

[4] Wong R C W, Li J Y, Fu A W C, et al. (α, k)-anonymous data publishing[J]. Journal of Intelligent Information Systems, 2009, 33(2): 209-234.

[5] Xiao X K, Tao Y F. Personalized privacy preservation//Proceedings of the ACM SIGMOD International Conference on Management of Data, 2006: 229-240.

[6] 韩建民,于娟,虞慧群,等. 面向敏感值的个性化隐私保护[J]. 电子学报, 2010, 38(7): 1723-1728. Han Jian-min, Yu Juan, Yu Hui-qun, et al. Individuation privacy preservation oriented to sensitive values[J]. Acta Electronic Sinica, 2010, 38(7):1723-1728.

[7] Wang Ke, Yu P S, Chakraborty S. Bottom-up generalization: a data mining solution to privacy protection//Proceedings of the IEEE International Conference on Data Mining, Brighton, UK, 2004:249-256.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!