MHD: A New Method towards Privacy Protecting Datasets Published

Article Preview

Abstract:

In this paper, we proposed a multi-hierarchical diversity algorithm MHD to prevent privacy disclosing in dataset. We proposed some definitions of multi-hierarchical diversity firstly. Sensitive values are partitioned into several classes. We ensured no proportion of class exceeding the threshold. We generalized some values of sensitive attribute to reduce information loss. Clustering method was used to lower data distort. Greed algorithm was used to lower time cost. We compared MHD with classic algorithms, ε-cloning and m-Invariance about Time Cost, Data Distort, Usability and Imbalance. Empirical results showed that our algorithm could protect privacy and publish datasets with high security and lower information loss

You might also be interested in these eBooks

Info:

Periodical:

Pages:

792-798

Citation:

Online since:

November 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sweeney, 2002, L. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness and Knowledge-based Systems. 10(5), (2002) 557-570.

DOI: 10.1142/s0218488502001648

Google Scholar

[2] Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M. 2006, L-diversity: Privacy beyond k-anonymity. ICDE (2006) 24-24.

DOI: 10.1109/icde.2006.1

Google Scholar

[3] Li. N, Li. T, Venkitasubramaniam, S. 2007, t-closeness: Privacy beyond k-anonymity and L-diversity. ICDE, (2007) 106-115.

Google Scholar

[4] Xiaokui Xiao, Yufei Tao. 2007, m-Invariance: Towards Privacy Preserving Re-publication of Dynamic Datasets. SIGMOD(2007) 689-700.

DOI: 10.1145/1247480.1247556

Google Scholar

[5] Yingyi Bu, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Lei Chen, Jiuyong Li. 2008, Privacy Preserving Serial Data Publishing By Role Composition. VLDB (2008) 1: 845-856.

DOI: 10.14778/1453856.1453948

Google Scholar

[6] Muzammil M. Baig, Jiuyong Li, Jixue Liu, Hua Wang. 2011, Cloning for Privacy Protection in Multiple Independent Data Publications. CIKM(2011) 885-894.

Google Scholar

[7] http: /ipums. org. 2010, Steven Ruggles, J. Trent Alexander, Katie Genadek, Ronald Goeken, Matthew B. Schroeder, and Matthew Sobek integrated public use microdata series: Version 5. 0. Minneapolis: University of Minnesota, (2010).

Google Scholar