Sun, Xiaoxun and Wang, Hua and Truta, Traian Marius and Li, Jiuyong and Li, Ping (2008) (p+, α)-sensitive k-anonymity: a new enhanced privacy protection model. In: 8th IEEE International Conference on Computer and Information Technology, 8-11 Jul 2008, Sydney, Australia.
PDF (Accepted Version)
Publishing data for analysis from a microdata table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-anonymity model was proposed for privacy preserving data publication. While focusing on identity disclosure, k-anonymity model fails to protect attribute disclosure to some extent. Many efforts are made to enhance the kanonymity model recently. In this paper, we propose a new privacy protection model called (p+, α)-sensitive kanonymity, where sensitive attributes are first partitioned into categories by their sensitivity, and then the categories that sensitive attributes belong to are published. Different from previous enhanced k-anonymity models, this model allows us to release a lot more information without compromising privacy. We also provide testing and heuristic generating algorithms. Experimental results show that our introduced model could significantly reduce the privacy breach.
|Item Type:||Conference or Workshop Item (Commonwealth Reporting Category E) (Paper)|
|Additional Information:||Deposited in accordance with the copyright policy of the publisher. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. Copyright 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.|
|Uncontrolled Keywords:||k-anonymity models; privacy protection models; (p+, α)-sensitive k-anonymity model|
|Subjects:||280000 Information, Computing and Communication Sciences > 280500 Data Format > 280505 Data Security|
|Depositing User:||Mr Xiaoxun Sun|
|Date Deposited:||14 Jul 2008 00:04|
|Last Modified:||02 Jul 2013 23:04|
Actions (login required)
|Archive Repository Staff Only|