DocumentCode
3302200
Title
(k, ε)-Anonymity: An anonymity model for thwarting similarity attack
Author
Haiyuan Wang ; Jianmin Han ; Jiyi Wang ; Lixia Wang
Author_Institution
Dept. of Comput. Sci. & Technol., Zhejiang Normal Univ., Jinhua, China
fYear
2013
fDate
13-15 Dec. 2013
Firstpage
332
Lastpage
337
Abstract
Existing anonymity models rarely consider the semantic similarity between sensitive values, so they cannot thwart similarity attack. To solve the problem, this paper proposes a (k, ε)-anonymity model which requires that each equivalence class in anonymous dataset satisfy k-anonymity constraints. At the same time, any two sensitive values in the same equivalence class are not ε-similar. The paper also proposes a (k, ε)-KACA algorithm. Experimental results show that the anonymous data satisfy(k, ε)-anonymity has higher diversity than that satisfy k-anonymity model, so (k, ε)-anonymity model can protect privacy more effective than k-anonymity model.
Keywords
data protection; equivalence classes; security of data; (k, ε)-KACA algorithm; (k, ε)-anonymity model; anonymous data; equivalence class; k-anonymity constraints; k-anonymity model; k-anonymization by clustering in attribute hierarchies; privacy protection; semantic similarity; sensitive values; similarity attack; Cancer; Clustering algorithms; Data models; Data privacy; Diseases; Privacy; Semantics; ε)-anonymity; (k; data privacy; k-anonymity; similarity attack;
fLanguage
English
Publisher
ieee
Conference_Titel
Granular Computing (GrC), 2013 IEEE International Conference on
Conference_Location
Beijing
Type
conf
DOI
10.1109/GrC.2013.6740431
Filename
6740431
Link To Document