首页 | 官方网站   微博 | 高级检索  
     

面向敏感值的个性化隐私保护
引用本文:韩建民,于娟,虞慧群,贾泂.面向敏感值的个性化隐私保护[J].电子学报,2010,38(7):1723-1728.
作者姓名:韩建民  于娟  虞慧群  贾泂
作者单位:1. 浙江师范大学数理与信息工程学院,浙江金华,321004
2. 华东理工大学计算机科学与工程系,上海,200237
基金项目:国家自然科学基金,上海市曙光计划,上海市浦江人才计划 
摘    要: 现有隐私保护匿名模型不能实现敏感值的个性化保护,为此,论文提出完全(α,k)匿名模型,该模型通过设置等价类中敏感值的出现频率来实现敏感值的个性化保护. 论文还提出(α,k)聚类算法来实现各种(α,k)匿名模型. 实验表明:完全(α,k)匿名模型能够以与其它(α,k)匿名模型近似的信息损失量和时间代价,获得更好的隐私保护.

关 键 词:  k)-匿名模型  k-匿名  l-多样性  同质性攻击  背景知识攻击
收稿时间:2008-12-1
修稿时间:2010-1-18

Individuation Privacy Preservation Oriented to Sensitive Values
HAN Jian-min,YU Juan,YU Hui-qun,JIA Jiong.Individuation Privacy Preservation Oriented to Sensitive Values[J].Acta Electronica Sinica,2010,38(7):1723-1728.
Authors:HAN Jian-min  YU Juan  YU Hui-qun  JIA Jiong
Affiliation:1.Mathematics, Physics and Information Engineering College of Zhejiang Normal University, Jinhua, Zhejiang 321004, China; 2.Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
Abstract:Existing anonymity models for privacy preservation cannot implement individuation preservation oriented to sensitive values. To solve the problem, the paper proposes a complete (α,k)-anonymity model which can implement individuation privacy preservation for sensitive values by setting the frequency constraints on each sensitive value in every equivalence class. The paper also proposes a (α,k)-clustering algorithm to implement all kinds of (α,k)-anonymity models .Experimental results show that the complete (α,k)-anonymity model provides better privacy preservation than other (α,k)-anonymity models with the similar information loss and execution time.
Keywords:  k)-anonymity model  k-anonymity  l-diversity  homogeneity attack  background knowledge attack
本文献已被 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号