An Enhanced Method for Privacy-Preserving Data Publishing

Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 713)

Abstract

A wide collection of sensitive information is available on the Internet. Privacy of this released data needs to be maintained. It is one of the biggest challenges in an information system. It is very essential to preserve the publishing data. The privacy in publishing data is applied before releasing the data. The techniques used for preserving privacy of published data are k-anonymity, l-diversity, and t-closeness. But these techniques have some limitations. K-anonymity prevents from the record linkage attack but fails to prevent attribute linkage attack. L-diversity overcomes the limitation of k-anonymity technique. But, it cannot prevent address identity disclosure attack and attribute disclosure attack in some exceptional cases. T-closeness technique preserves the attribute linkage attack but does not identity disclosure attack, but it has large computational complexity. In all the techniques, there is one more issue named as data utility. Thus, in current paper, we propose a new technique which is an enhanced version of k-anonymity. An algorithm is presented named as (P, U)-sensitive k-anonymity, which minimizes the rate of attacks and increases the data utility of published data. This technique gives us better result in terms of running time, similarity attack, and data utility.

Keywords

Sensitive attributes Datasets 

References

  1. 1.
    L. Wu, W. Luo, D. Zhao, SvdNPD: a negative data publication method based on the sensitive value distribution, in 2015 International Workshop on Artificial Immune Systems (AIS) (IEEE, 2015)Google Scholar
  2. 2.
    L. Sweeney, k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)Google Scholar
  3. 3.
    A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, L-Diversity: Privacy Beyond k-Anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD) (2007)Google Scholar
  4. 4.
    L. Sweeney, Uniqueness of simple demographics in the U.S. population. Technical report, Carnegie Mellon University (2000)Google Scholar
  5. 5.
    N. Li, T. Li, S. Venkatasubramanian, t-closeness: privacy beyond k-anonymity and l-diversity, in IEEE 23rd International Conference on Data Engineering (ICDE 2007) (IEEE, 2007)Google Scholar
  6. 6.
    C. Clifton et al., Privacy-Preserving Data Integration and Sharing, in Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (ACM, 2004)Google Scholar
  7. 7.
    T. Li, N. Li, On the tradeoff between privacy and utility in data publishing, in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, 2009)Google Scholar
  8. 8.
    B. Fung, K. Wang, P. Yu, Top-down specialization for information and privacy preservation, in Proceedings of the 21st International Conference on Data Engineering (ICDE05), Tokyo, Japan (2005)Google Scholar
  9. 9.
    K. LeFevre, D. DeWitt, R. Ramakrishnan, Incognito: efficient full-domain k-anonymity, in ACM SIGMOD International Conference on Management of Data (2005)Google Scholar
  10. 10.
    L. Sweeney, Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5)Google Scholar
  11. 11.
    X. Sun, H. Wang, J. Li, On the complexity of restricted-anonymity problem, in Accepted by the 10th Asia Pacific WebConference (APWEB 2008), Shenyang, China (2008)Google Scholar
  12. 12.
    T.M. Truta, A. Campan, P. Meyer, Generating micro data with P -sensitive k -anonymity property. SDM, (2007) pp. 124–141Google Scholar
  13. 13.
    X. Sun, H. Wang, L. Sun, Extended K-anonymity models against attribute disclosure. in 3rd International Conference on Network and System Security, 2009. NSS’09 (IEEE, 2009)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer SciencePranveer Singh Institute of TechnologyKanpurIndia
  2. 2.Department of Computer ScienceJaypee Institute of Information TechnologyNoidaIndia

Personalised recommendations