Abstract
Data privacy is very essential attribute for information sharing in cloud applications. Many end users find it challenging to adopt advanced technologies of cloud services, such as software-as-a-service, application-as-a-service, for protection of sensitive data in their health applications. Considerable research has been done in Privacy Preservation of sensitive data while ‘statistical analysis using data mining techniques’ such as k-anonymity being prominent. The term k-anonymity with respect to privacy of sensitive data is referred as sensitive information of an individual published and which cannot be distinguished from at least \(k-1\) individuals. k-Anonymity is achieved precisely with clustering techniques. However, the challenge is to find the best seed values for collecting allied records which can be anonymized at the same level in order to reduce information loss. This paper proposes a systematic approach for seed selection to cluster the records using the adaptive k-anonymity algorithm. A comparative study of recent works with a goal to reduce information loss and execution time is calibrated.
Similar content being viewed by others
References
Yang, J.-J.; Jian-Qiang, L.; Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Futur. Gener. Comput. Syst. 43–44, 74–86 (2015)
Zhang, X.; Liu, C.; Nepal, S.; Chen, J.: An efficient quasiidentifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79, 542–555 (2013)
Xiao, X.K.; Tao, Y.F.: Anonymity: simple and effective privacy preservation. In: Proceedings of 32nd International Conference on Very Large Databases (VLDB ’06), pp. 139–150, Seoul, Korea (2006)
Sweeney, L.: k-Anonymity: a model for protection privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)
El Emam, K.; Dankar, F.K.: Protecting privacy using k-anonymity. J. Am. Med. Inform. Assoc. 15(5), 627–37 (2008)
Gkoulalas-Divanis, A.; Loukides, G.; Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4–19 (2014)
Hundepool, A.; Willenborg, L.: \(\mu \)- and \(\tau \)-argus, software for statistical disclosure control. In: Third International Seminar on Statistical Confidentiality. Bled, (1996)
Sweeney, L.: Guaranteeing anonymity when sharing medical data, the Datafly system. J. Am. Med. Inform. Assoc. Washington, Hanley & Belfus, Inc., (1997)
LeFevre, K.; DeWitt, D.J.; Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. 24th ACM SIGMOD International Conference on Management of Data, pp. 49–60. Baltimore, Maryland (2005)
Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of the eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
LeFevre, K.; DeWitt, D.J.; Ramakrishnan, R.: Mondrian multidimensional \(k\)-anonymity. In: 22nd International Conference on Data Engineering (ICDE 06), p. 25, Atlanta, Georgia (2006)
Li, J.Y.; Wong, R.C.; Fu, A.W.; Pei, J.: Achieving \(k\)-anonymity by clustering in attribute hierarchical structures. In: 8th International Conference on Data Warehousing and Knowledge Discovery, pp. 405–416, Krakow (2006)
Ni, S.; Xie, M.; Qian, Q.: Clustering based k-anonymity algorithm for privacy preservation. Int. J. Netw. Secur. 19(6), 1062–1071 (2017)
Pierangela, S.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)
Byun, J.-W.; Kamra, A.; Bertino, E.; Li, N.: Efficient \(k\)-anonymization using clustering techniques. In: International Conference on Database System for Advanced Applications (DASFAA), (2007)
Loukides, G.; Shao, J.: Capturing data usefulness and privacy protection in \(k\)-anonymisation. In: Proceedings of the 2007 ACM Symposium on Applied Computing
Janakiramaiah, B.; Reddy, A.R.M.: Privacy preserving association rule mining by concept of impact factor using item lattice. WSEAS Trans. Comput. 14, 567–581 (2014)
Bonam, J.; Reddy, R.: Balanced approach for hiding sensitive association rules in data sharing environment. Int. J. Inf. Secur. Priv. (IJISP) 8(3), 39–62 (2014). https://doi.org/10.4018/IJISP.2014070103
Chiu, C.-C.; Tsai, C.-Y.: A \(k\)-anonymity clustering method for effective data privacy preservation. In: Third International Conference on Advanced Data Mining and Application (ADMA) (2007)
Lin, J.-L.; Wei, M.-C.: An efficient clustering method for \(k\)-anonymization. In: International Workshop on Privacy and Anonymity in The Information Society, (2008)
Lin, J.-L.; Wei, M.-C.; Li, C.-W.; Hsieh, K.-C.: A hybrid method for \(k\)-anonymization. In: 2008 IEEE Asia-pacific Services Computing Conference
EnamulKabir, M.; Wang, H.; Bertinov, E.: Efficient systematic clustering method for k-anonymization. Acta Inform. 48, 51–66 (2011)
Pranamik, M.I.; Lau, R.Y.K.; Zhang, W.: \(k\)-anonymity through the enhanced clustering method. In: IEEE International Conference for e-Business Engineering, (2016)
Abouelmehdi, K.; Beni-Hessane, A.; Khalouf, H.: Big healthcare data: preserving security and privacy. J. Big Data 5, 1 (2018)
Xu, L.; Jiang, C.; Chen, Y.; Wang, J.; Ren, Y.: A framework for categorizing and applying privacy-preservation techniques in big data mining. IEEE Comput. Soc. 49(2), 54–62 (2016)
Rong, H.; Wang, H.; Liu, J.; Xian, M.: Privacy-preserving \(k\)-nearest neighbor computation in multiple cloud environments. In: IEEE Access on Volume: 4
Liu, F.; Li, T.: A clustering \(k\)-anonymity privacy-preserving method for wearable IoT devices. In: Hindawi, Security and Communication Networks, Wiley, (2018)
Zheng, W.; Wang, Z.; Lv, T.; Ma, Y.; Jia, C.: \(k\)-Anonymity algorithm based on improved clustering. In: Vaidya, J.; Li, J. (Eds.) ICA3PP 2018, LNCS 11335, pp. 462–476. Springer Nature, Switzerland (2018)
Aha, D.; Murphy, P.; Merz, C.; Keogh, E.; Blake, C.: Seth Hettich. David Newman, UCI Repository of Machine Learning Datasets (1987)
Fung, B.C.M.; Wang, K.; Yu, P.S.: Top–down specialization for information and privacy preservation. In: 21st International Conference on Data Engineering, pp. 205–216, (2005)
Lin, J.-L.; Wei, M.-C.: Genetic algorithm-based clustering approach for k-anonymization. Exp. Syst. Appl. 36, 9784–9792 (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Arava, K., Lingamgunta, S. Adaptive k-Anonymity Approach for Privacy Preserving in Cloud. Arab J Sci Eng 45, 2425–2432 (2020). https://doi.org/10.1007/s13369-019-03999-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-019-03999-0