Abstract
Present privacy preserving data publishing model only consider the tables with one sensitive attribute, so it isn’t match tables with multi-sensitive attributes. The approach based on multi-sensitive bucketization can protect the privacy of multi-sensitive attributes data publishing effectively, unfortunately, it is at a cost of hundreds of records being suppressed. This paper proposes an l-coverage cluster grouping model based on the same set of sensitive attributes to address the problem. On the premise of none suppressed record, a cluster algorithm is designed to implement the model. Extensive experiments illustrate that the new model can protect privacy of data with multi-sensitive attributes effectively and enforce the usability of data publishing.
Supported partially by the NFS of China under grants No.60773049.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fung, B.C.M., Wang, K., Chen, R., et al.: Privacy-preserving data publishing: a survey on recent developments. ACM Computing Surveys 42(4), 1–55 (2010)
Sweeney, L.: K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-Based Systems 10(5), 557–570 (2002)
Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proceedings of the 23rd ACM SIGACT-SIG-MOD-SIGART Symposium on Principles of Database Systems, Paris, France, pp. 223–228 (2004)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 571–588 (2002)
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering (ICDE), Atlanta, Georgia, USA, pp. 24–36 (2006)
Wong, C.R., Li, J., Fu, A., et al.: (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proc. of the 12th ACM SIGKDD Conference Philadelphia, pp. 754–759. ACM Press, PA (2006)
Li, N., Li, T., Venkatasubramanian, S.: T-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the IEEE ICDE, Istanbul, Turkey, pp. 44–56 (2007)
Yang, X.-C., Wang, Y.-Z., Wang, B., et al.: Privacy Preserving Approaches for Multiple Sensitive Attributes in Data Publishing. Chinese Journal of Computers 31(4), 574–587 (2008) (in Chinese)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jin, H., Liu, SC., Ju, SG. (2011). Privacy Preserving for Multiple Sensitive Attributes Based on l-Coverage. In: Wu, Y. (eds) High Performance Networking, Computing, and Communication Systems. ICHCC 2011. Communications in Computer and Information Science, vol 163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25002-6_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-25002-6_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25001-9
Online ISBN: 978-3-642-25002-6
eBook Packages: Computer ScienceComputer Science (R0)