Skip to main content

Privacy Preserving for Multiple Sensitive Attributes Based on l-Coverage

  • Conference paper
High Performance Networking, Computing, and Communication Systems (ICHCC 2011)

Abstract

Present privacy preserving data publishing model only consider the tables with one sensitive attribute, so it isn’t match tables with multi-sensitive attributes. The approach based on multi-sensitive bucketization can protect the privacy of multi-sensitive attributes data publishing effectively, unfortunately, it is at a cost of hundreds of records being suppressed. This paper proposes an l-coverage cluster grouping model based on the same set of sensitive attributes to address the problem. On the premise of none suppressed record, a cluster algorithm is designed to implement the model. Extensive experiments illustrate that the new model can protect privacy of data with multi-sensitive attributes effectively and enforce the usability of data publishing.

Supported partially by the NFS of China under grants No.60773049.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fung, B.C.M., Wang, K., Chen, R., et al.: Privacy-preserving data publishing: a survey on recent developments. ACM Computing Surveys 42(4), 1–55 (2010)

    Article  Google Scholar 

  2. Sweeney, L.: K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-Based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  3. Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proceedings of the 23rd ACM SIGACT-SIG-MOD-SIGART Symposium on Principles of Database Systems, Paris, France, pp. 223–228 (2004)

    Google Scholar 

  4. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 571–588 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  5. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering (ICDE), Atlanta, Georgia, USA, pp. 24–36 (2006)

    Google Scholar 

  6. Wong, C.R., Li, J., Fu, A., et al.: (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proc. of the 12th ACM SIGKDD Conference Philadelphia, pp. 754–759. ACM Press, PA (2006)

    Google Scholar 

  7. Li, N., Li, T., Venkatasubramanian, S.: T-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the IEEE ICDE, Istanbul, Turkey, pp. 44–56 (2007)

    Google Scholar 

  8. Yang, X.-C., Wang, Y.-Z., Wang, B., et al.: Privacy Preserving Approaches for Multiple Sensitive Attributes in Data Publishing. Chinese Journal of Computers 31(4), 574–587 (2008) (in Chinese)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jin, H., Liu, SC., Ju, SG. (2011). Privacy Preserving for Multiple Sensitive Attributes Based on l-Coverage. In: Wu, Y. (eds) High Performance Networking, Computing, and Communication Systems. ICHCC 2011. Communications in Computer and Information Science, vol 163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25002-6_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25002-6_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25001-9

  • Online ISBN: 978-3-642-25002-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics