Skip to main content

(k, l)-Clustering for Transactional Data Streams Anonymization

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11125))

Abstract

In this paper, we address the correlation problem in the anonymization of transactional data streams. We propose a bucketization-based technique, entitled (k, l)-clustering to prevent such privacy breaches by ensuring that the same k individuals remain grouped together over the entire anonymized stream. We evaluate our algorithm in terms of utility by considering two different (k, l)-clustering approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/JMTCoder/test12/blob/master/sourcedata.txt

References

  1. Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  2. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  3. Campan, A., Cooper, N., Truta, T.M.: On-the-fly generalization hierarchies for numerical attributes revisited. In: Jonker, W., Petković, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 18–32. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23556-6_2

    Chapter  Google Scholar 

  4. He, Y., Naughton, J.F.: Anonymization of set-valued data via top-down, local generalization. Proc. VLDB Endow. 2(1), 934–945 (2009)

    Article  Google Scholar 

  5. Anjum, A., Raschia, G.: BangA: an efficient and flexible generalization-based algorithm for privacy preserving data publication. Computers 6(1), 1 (2017)

    Article  Google Scholar 

  6. Xiao, X., Tao. Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of 32nd International Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea (2006)

    Google Scholar 

  7. Li, T., Li, N., Zhang, J., Molloy, I.: Slicing: a new approach for privacy preserving data publishing. IEEE Trans. Knowl. Data Eng. 24(3), 561–574 (2012)

    Article  Google Scholar 

  8. Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13, 22:1–22:33 (2010)

    Article  Google Scholar 

  9. Manolis, T., Nikos, M., John, L., Spiros, S.: Privacy preservation by disassociation. Proc. VLDB Endow. 5(10), 944–955 (2012)

    Article  Google Scholar 

  10. Wang, K., Wang, P., Fu, A.W., Wong, R.C.: Generalized bucketization scheme for flexible privacy settings. Inf. Sci. 348, 377–393 (2016)

    Article  MathSciNet  Google Scholar 

  11. Wong, R.C., Fu, A.W., Wang, K., Yu, P., Jian, P.: Can the utility of anonymized data be used for privacy breaches? ACM Trans. Knowl. Discov. Data 5(3), 16:1–16:24 (2011)

    Article  Google Scholar 

  12. Cormode, G., Li, N., Li, T., Srivastava, D.: Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data. Proc. VLDB Endow. 3, 1045–1056 (2010)

    Article  Google Scholar 

  13. Kifer, D., Attacks on privacy and deFinetti’s theorem. In: SIGMOD Conference, pp. 127–138 (2009)

    Google Scholar 

  14. Al Bouna, B., Clifton, C., Malluhi, Q.M.: Efficient sanitization of unsafe data correlations. In: Proceedings of the Workshops of the EDBT/ICDT 2015 Joint Conference (EDBT/ICDT), Brussels, Belgium, pp. 278–285 (2015)

    Google Scholar 

  15. Li, T., Li, N.: Injector: mining background knowledge for data anonymization. In: ICDE, pp. 446–455 (2008)

    Google Scholar 

  16. Al Bouna, B., Clifton, C., Malluhi, Q.: Using Safety constraint for transactional dataset anonymization. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 164–178. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39256-6_11

    Chapter  Google Scholar 

  17. Al Bouna, B., Clifton, C., Malluhi, Q.M.: Anonymizing transactional datasets. J. Comput. Secur. 23(1), 89–106 (2015)

    Article  Google Scholar 

  18. Gong, Q., Luo, J., Yang, M., Ni, W., Li, X.I.: Anonymizing 1: M microdata with high utility. Knowl.-Based Syst. 115(Suppl. C), 15–26 (2017)

    Article  Google Scholar 

  19. Lu, J., Wang, P., Zhao, L., Yang, J.: Sanatomy: privacy preserving publishing of data streams via anatomy. In: 2010 Third International Symposium on Information Processing (ISIP). IEEE (2010)

    Google Scholar 

  20. Yazdani, N., Amiri, F., Shakery, A.: Bottom-up sequential anonymization in the presence of adversary knowledge. Inf. Sci. 405, 316–335 (2018)

    MathSciNet  Google Scholar 

  21. Cao, J., Carminati, B., Ferrari, E., Tan, K.: Castle: continuously anonymizing data streams. IEEE Trans. Dependable Secur. Comput. 8(3), 337–352 (2011)

    Article  Google Scholar 

  22. Zhao, L., Wang, P., Lu, J., Yang, J.: B-castle: an efficient publishing algorithm for k-anonymizing data streams. In: 2010 Second WRI Global Congress on Intelligent Systems (GCIS), pp. 2155–6083. IEEE (2011)

    Google Scholar 

  23. Zakerzadeh, H., Osborn, S.L.: FAANST: fast anonymizing algorithm for numerical streaming DaTa. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM/SETOP -2010. LNCS, vol. 6514, pp. 36–50. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19348-4_4

    Chapter  Google Scholar 

  24. Guo, K., Zhang, Q.: Fast clustering-based anonymization approaches with time constraints for data streams. Knowl.-Based Syst. 46, 95–108 (2013)

    Article  Google Scholar 

  25. Noferesti, M., Mohammadian, E., Jalili, R.: Fast: Fast anonymization of big data streams. In: Proceeding BigDataScience, 14 Proceedings of the 2014 International Conference on Big Data Science and Computing. ACM (2014)

    Google Scholar 

  26. Shakery, A., Amiri, F., Yazdani, N., Chinaei, A.H.: Hierarchical anonymization algorithms against background knowledge attack in data releasing. Knowl.-Based Syst. 101, 71–89 (2016)

    Article  Google Scholar 

  27. Domingo-Ferrer, J., Soria-Comas, J.: Steered microaggregation: a unified primitive for anonymization of data sets and data streams. In: 2017 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE (2017)

    Google Scholar 

  28. Ghafoor, A., Pervaiz, Z., Aref, W.G.: Precision-bounded access control using sliding-window query views for privacy-preserving data streams. IEEE Trans. Knowl. Data Eng. 27, 1992–2004 (2015)

    Article  Google Scholar 

  29. Bonomi, L., Xiong, L.: On differentially private longest increasing subsequence computation in data stream. Trans. Data Priv. 9, 73–100 (2016)

    Google Scholar 

  30. Nie, Y., et al.: Geospatial streams publish with differential privacy. In: Wang, S., Zhou, A. (eds.) CollaborateCom 2016. LNICST, vol. 201, pp. 152–164. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59288-6_14

    Chapter  Google Scholar 

  31. Liu, X., et al.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans. Dependable Secur. Comput. 14, 507–520 (2017)

    Article  Google Scholar 

  32. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jimmy Tekli , Bechara Al Bouna or Youssef Bou Issa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tekli, J., Al Bouna, B., Bou Issa, Y., Kamradt, M., Haraty, R. (2018). (k, l)-Clustering for Transactional Data Streams Anonymization. In: Su, C., Kikuchi, H. (eds) Information Security Practice and Experience. ISPEC 2018. Lecture Notes in Computer Science(), vol 11125. Springer, Cham. https://doi.org/10.1007/978-3-319-99807-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99807-7_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99806-0

  • Online ISBN: 978-3-319-99807-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics