DocumentCode :
3302200
Title :
(k, ε)-Anonymity: An anonymity model for thwarting similarity attack
Author :
Haiyuan Wang ; Jianmin Han ; Jiyi Wang ; Lixia Wang
Author_Institution :
Dept. of Comput. Sci. & Technol., Zhejiang Normal Univ., Jinhua, China
fYear :
2013
fDate :
13-15 Dec. 2013
Firstpage :
332
Lastpage :
337
Abstract :
Existing anonymity models rarely consider the semantic similarity between sensitive values, so they cannot thwart similarity attack. To solve the problem, this paper proposes a (k, ε)-anonymity model which requires that each equivalence class in anonymous dataset satisfy k-anonymity constraints. At the same time, any two sensitive values in the same equivalence class are not ε-similar. The paper also proposes a (k, ε)-KACA algorithm. Experimental results show that the anonymous data satisfy(k, ε)-anonymity has higher diversity than that satisfy k-anonymity model, so (k, ε)-anonymity model can protect privacy more effective than k-anonymity model.
Keywords :
data protection; equivalence classes; security of data; (k, ε)-KACA algorithm; (k, ε)-anonymity model; anonymous data; equivalence class; k-anonymity constraints; k-anonymity model; k-anonymization by clustering in attribute hierarchies; privacy protection; semantic similarity; sensitive values; similarity attack; Cancer; Clustering algorithms; Data models; Data privacy; Diseases; Privacy; Semantics; ε)-anonymity; (k; data privacy; k-anonymity; similarity attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Granular Computing (GrC), 2013 IEEE International Conference on
Conference_Location :
Beijing
Type :
conf
DOI :
10.1109/GrC.2013.6740431
Filename :
6740431
Link To Document :
بازگشت