Skip to main content

An Efficient Local-Recoding k-Anonymization Algorithm Based on Clusterin

  • Conference paper
  • First Online:
Transactions on Edutainment XI

Part of the book series: Lecture Notes in Computer Science ((TEDUTAIN,volume 8971))

  • 909 Accesses

Abstract

KACA is a typical local-recoding k-anonymization algorithm. It can generate k-anonymizing data with high quality. The main drawback of KACA algorithm is its high computational cost in dealing with large dataset. To remedy this problem, we propose an new efficient k-anonymization algorithm. The main idea of the proposed algorithm is that we first adopt the c-modes algorithm to partition the whole dataset into some large clusters, and then take KACA algorithm to k-anonymize each cluster separately. Finally, comprehensive experiments demonstrate the effectiveness of our algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: Proceedings of the 17th ACM-SIGMOD, p. 188 (1998)

    Google Scholar 

  2. LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of the SIGMOD 2005, pp. 49–60 (2005)

    Google Scholar 

  3. Li, J., Wong, R.C.-W., Fu, A.W.-C., Pei, J.: Achieving k-anonymity by clustering in attribute hierarchical structures. In: Tjoa, A.M., Trujillo, J. (eds.) DaWaK 2006. LNCS, vol. 4081, pp. 405–416. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Aggarwal, G., Feder, T., Kenthapadi, K. et al.: Achieving anonymity via clustering. In: Proceedings of the 25th ACM SIGMOD, pp. 153–162 (2006)

    Google Scholar 

  5. Zhu, H., Ye, X.: Achieving k-anonymity via a density-based clustering method. In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds.) APWeb/WAIM 2007. LNCS, vol. 4505, pp. 745–752. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Byun, J.-W., Kamra, A., Bertino, E., Li, N.: Efficient k-anonymization using clustering techniques. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 188–200. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Xu, J., Wang, W., Pei, J., et al.: Utility-based anonymization for privacy preservation with less information loss. ACM SIGKDD Explor. Newslett. 8(2), 21–30 (2006)

    Article  Google Scholar 

  8. Grigorios, L., Shao, J.: An efficient clustering algorithm for k-anonymisation. J. Comput. Sci. Technol. 23(2), 188–202 (2008)

    Article  Google Scholar 

  9. Tapas, K., David, M., Mount, M., et al.: An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 881–892 (2002)

    Article  Google Scholar 

  10. Chiu, C.-C., Tsai, C.-Y.: A k-anonymity clustering method for effective data privacy preservation. In: Alhajj, R., Gao, H., Li, X., Li, J., Zaïane, O.R. (eds.) ADMA 2007. LNCS (LNAI), vol. 4632, pp. 89–99. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Huang, Z.: Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Min. Knowl. Discov. 2(3), 283–304 (1998)

    Article  Google Scholar 

  12. Chen, X., Pang, J.: Protecting query privacy in location-based services. Geoinformatica 18, 1–39 (2013)

    Google Scholar 

  13. Damiani, M.L.: Location privacy models in mobile applications: conceptual view and research directions. Geoinformatica 18, 1–24 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

This paper is supported by the major science and technology projects of Shaoxing city (2010A21034).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lifeng Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, L., Yang, Q. (2015). An Efficient Local-Recoding k-Anonymization Algorithm Based on Clusterin. In: Pan, Z., Cheok, A., Mueller, W., Zhang, M. (eds) Transactions on Edutainment XI. Lecture Notes in Computer Science(), vol 8971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48247-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48247-6_24

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48246-9

  • Online ISBN: 978-3-662-48247-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics