J4 ›› 2009, Vol. 27 ›› Issue (02): 173-.

Previous Articles     Next Articles

k-Anonymity via Twice Clustering for Privacy Preservation

LI Tai-yong1,2, TANG Chang-jie2, WU Jiang1,2 ,ZHOU Min3   

  1. 1. School of Economic Information Engineering, Southwest University of Finance and Economics, Chengdu 610074,China;2.School of Computer Science, Sichuan University, Chengdu 610065, China;3. College of Computer Science, Civil Aviation Flight University of China, Guanghan 618307, China
  • Online:2009-03-20 Published:2009-07-06

Abstract:

k-anonymity is a current hot spot for privacy preservation. The existing k-anonymous methods ignored the quasi-identifiers different influences on the sensitive attributes and clustered the tuples only, which caused much information loss while publishing the data. To cope with this problem, a novel k-anonymity via twice clustering and the concept of influence matrix to express the quasi-identifiers influences on different sensitive attributes are proposed. The clustering techniques over influence matrix are investigated and the tuples with near influences on the sensitive attributes are clustered to achieve k-anonymity. The experimental results show that the proposed methods are effective and feasible to privacy preservation.Compared with basic k-anonymity, the methods have less average equivalence class size and less run time.

Key words: k-anonymity, privacy preservation, data security, clustering

CLC Number: 

  • TP311.13