Advertisement

Research on Privacy Preserving Based on K-Anonymity

  • Xiao-ling Zhu
  • Ting-gui Chen
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 107)

Abstract

K-anonymity is a highlighted topic of privacy preservation research in recent years, for it can effectively prevent privacy leaks caused by link attacks; so far K-anonymity has been widely used in all fields. In this chapter, based on the existing K-anonymity privacy protection of the basic ideas and concepts, K-anonymity model, and enhanced the K-anonymity model has been studied, finally, the future directions in this field are discussed.

Keywords

Privacy preservation K-anonymity Generalization and suppression The enhanced K-anonymity 

Notes

Acknowledgments

This research is supported by Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20103326120001), Zhejiang Provincial Natural Science Foundation of China (No. Y7100673), Zhejiang Provincial Social Science Foundation of China (Grant No. 10JDSM03YB), and the Contemporary Business and Trade Research Center of Zhejiang Gongshang University (No. 1130KUSM09013 and 1130KU110021) as well as Research Project of Department of Education of Zhejiang Province (No. Y200907458). We also gratefully acknowledge the support of Science and Technology Innovative project (No. 1130XJ1710215).

References

  1. 1.
    Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression [J]. Intern J Uncertain Fuzziness Knowl-based Syst 10(5):571–588Google Scholar
  2. 2.
    Sweeney L (2002) k-Anonymity: a model for protecting privacy [J]. Intern J Uncertain Fuzziness Knowl-based Syst 10(7):557–570CrossRefMATHMathSciNetGoogle Scholar
  3. 3.
    Sweeney L (2001) Computational disclosure control: a primer on data privacy protection, Ph. D. thesis Massachusetts Institute of Technology, pp 67–82Google Scholar
  4. 4.
    Samarati P, Sweeney L (1998) Generalizing data to provide anonymity when disclosing information (abstract). In: Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems, Seattle, p 188Google Scholar
  5. 5.
    Long Q (2010) Privacy protection based on k-anonymity [J]. Sci Technol Assoc Forum 3:41–43Google Scholar
  6. 6.
    Qin X, Men A, Zou Y (2010) Privacy protection based on Kanonymity algorithms [J]. J Chifeng Univ 26(5):14–16Google Scholar
  7. 7.
    Wang P, Wang J (2010) Progress of research on K-anonymity privacy2preserving techniques. J Chi-feng Univ (Nat Sci Ed) [J] 27(6):2016–2019Google Scholar
  8. 8.
    Kan Y, Cao T (2010) Enhanced privacy preserving K-anonymity model (α, L)-diversity K-anonymity. Comput Eng Appl 46(21):148–151Google Scholar
  9. 9.
    Cen T, Han J, Wang J, Li X (2008) Survey of K-anonymity research on privacy preservation. Comput Eng Appl 44(4):130–134Google Scholar
  10. 10.
    Wong R, Li J, Fu A et al (2006) (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing [C]. In: International conference on knowledge discovery and data mining, vol 123. pp 754–759Google Scholar
  11. 11.
    Aggarwal G, Feder T, Kenthapadi K et al (2005) Anonymizing tables[C]. In: Proceedings of the 10th international conference on database theory (ICDT05), Edinburgh, Scotland, pp 246–258Google Scholar
  12. 12.
    Machanavajjhala A, Gehrke J, Kifer D (2007) l-Diversity: privacy beyond k-anonymity [J]. ACM Trans Knowl Discov Data 1(1):24–35CrossRefGoogle Scholar
  13. 13.
    Li N, Li T, Venkatasubramanian S (2007) T-closeness: privacy beyond k-anonymity and l-diversity [C]. ICDE, pp 106–115Google Scholar
  14. 14.
    Fung B, Wang K, Yu P (2005) Top–down specialization for information and privacy preservation [C]. In: Proceedings of the 21st international conference on data engineering (ICDE05), Tokyo, JapanGoogle Scholar
  15. 15.
    Meyerson A, Williams R (2004) On the complexity of optimal K-anonymity [C]. In: Proceedings of the 23rd ACM-SIGMOD-SIGACTSIGART symposium on the principles of database systems, Paris, France, pp 223–228Google Scholar
  16. 16.
    LeFevre K, DeWitt DJ, Ramakrishnan R (2005) Incognito: efficient full-domain k-anonymity. In: SIGMOD’ 05 proceedings of the 2005 ACM SIGMOD international conference on management of data, pp 49–60Google Scholar
  17. 17.
    Bayardo R, Agrawal R (2005) Data privacy through optimal K-anonymity. In: ICDE05: the 21st international conference on data engineering, pp 217–228Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2012

Authors and Affiliations

  1. 1.College of Computer Science and Information EngineeringZhejiang Gongshang UniversityHangzhouChina
  2. 2.Contemporary Business and Trade Research CenterZhejiang Gongshang UniversityHangzhouChina

Personalised recommendations