Abstract
KACA is a typical local-recoding k-anonymization algorithm. It can generate k-anonymizing data with high quality. The main drawback of KACA algorithm is its high computational cost in dealing with large dataset. To remedy this problem, we propose an new efficient k-anonymization algorithm. The main idea of the proposed algorithm is that we first adopt the c-modes algorithm to partition the whole dataset into some large clusters, and then take KACA algorithm to k-anonymize each cluster separately. Finally, comprehensive experiments demonstrate the effectiveness of our algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: Proceedings of the 17th ACM-SIGMOD, p. 188 (1998)
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of the SIGMOD 2005, pp. 49–60 (2005)
Li, J., Wong, R.C.-W., Fu, A.W.-C., Pei, J.: Achieving k-anonymity by clustering in attribute hierarchical structures. In: Tjoa, A.M., Trujillo, J. (eds.) DaWaK 2006. LNCS, vol. 4081, pp. 405–416. Springer, Heidelberg (2006)
Aggarwal, G., Feder, T., Kenthapadi, K. et al.: Achieving anonymity via clustering. In: Proceedings of the 25th ACM SIGMOD, pp. 153–162 (2006)
Zhu, H., Ye, X.: Achieving k-anonymity via a density-based clustering method. In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds.) APWeb/WAIM 2007. LNCS, vol. 4505, pp. 745–752. Springer, Heidelberg (2007)
Byun, J.-W., Kamra, A., Bertino, E., Li, N.: Efficient k-anonymization using clustering techniques. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 188–200. Springer, Heidelberg (2007)
Xu, J., Wang, W., Pei, J., et al.: Utility-based anonymization for privacy preservation with less information loss. ACM SIGKDD Explor. Newslett. 8(2), 21–30 (2006)
Grigorios, L., Shao, J.: An efficient clustering algorithm for k-anonymisation. J. Comput. Sci. Technol. 23(2), 188–202 (2008)
Tapas, K., David, M., Mount, M., et al.: An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 881–892 (2002)
Chiu, C.-C., Tsai, C.-Y.: A k-anonymity clustering method for effective data privacy preservation. In: Alhajj, R., Gao, H., Li, X., Li, J., Zaïane, O.R. (eds.) ADMA 2007. LNCS (LNAI), vol. 4632, pp. 89–99. Springer, Heidelberg (2007)
Huang, Z.: Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Min. Knowl. Discov. 2(3), 283–304 (1998)
Chen, X., Pang, J.: Protecting query privacy in location-based services. Geoinformatica 18, 1–39 (2013)
Damiani, M.L.: Location privacy models in mobile applications: conceptual view and research directions. Geoinformatica 18, 1–24 (2014)
Acknowledgements
This paper is supported by the major science and technology projects of Shaoxing city (2010A21034).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, L., Yang, Q. (2015). An Efficient Local-Recoding k-Anonymization Algorithm Based on Clusterin. In: Pan, Z., Cheok, A., Mueller, W., Zhang, M. (eds) Transactions on Edutainment XI. Lecture Notes in Computer Science(), vol 8971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48247-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-662-48247-6_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48246-9
Online ISBN: 978-3-662-48247-6
eBook Packages: Computer ScienceComputer Science (R0)