• DocumentCode
    3302200
  • Title

    (k, ε)-Anonymity: An anonymity model for thwarting similarity attack

  • Author

    Haiyuan Wang ; Jianmin Han ; Jiyi Wang ; Lixia Wang

  • Author_Institution
    Dept. of Comput. Sci. & Technol., Zhejiang Normal Univ., Jinhua, China
  • fYear
    2013
  • fDate
    13-15 Dec. 2013
  • Firstpage
    332
  • Lastpage
    337
  • Abstract
    Existing anonymity models rarely consider the semantic similarity between sensitive values, so they cannot thwart similarity attack. To solve the problem, this paper proposes a (k, ε)-anonymity model which requires that each equivalence class in anonymous dataset satisfy k-anonymity constraints. At the same time, any two sensitive values in the same equivalence class are not ε-similar. The paper also proposes a (k, ε)-KACA algorithm. Experimental results show that the anonymous data satisfy(k, ε)-anonymity has higher diversity than that satisfy k-anonymity model, so (k, ε)-anonymity model can protect privacy more effective than k-anonymity model.
  • Keywords
    data protection; equivalence classes; security of data; (k, ε)-KACA algorithm; (k, ε)-anonymity model; anonymous data; equivalence class; k-anonymity constraints; k-anonymity model; k-anonymization by clustering in attribute hierarchies; privacy protection; semantic similarity; sensitive values; similarity attack; Cancer; Clustering algorithms; Data models; Data privacy; Diseases; Privacy; Semantics; ε)-anonymity; (k; data privacy; k-anonymity; similarity attack;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Granular Computing (GrC), 2013 IEEE International Conference on
  • Conference_Location
    Beijing
  • Type

    conf

  • DOI
    10.1109/GrC.2013.6740431
  • Filename
    6740431