Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Hierarchical ( αij, k, m)-anonymity privacy preservation based on multiple sensitive attributes
WANG Qiuyue, GE Lina, GENG Bo, WANG Lijuan
Journal of Computer Applications    2018, 38 (1): 67-72.   DOI: 10.11772/j.issn.1001-9081.2017071863
Abstract486)      PDF (1111KB)(293)       Save
To resist existing limitations and associated attack by anonymization of single sensitive attributes, an ( α ij, k,m)-anonymity model based on greedy algorithm was proposed. Firstly, the ( α ij, k,m)-anonymity model was mainly to protect multi-sensitive attribute information. Secondly, the model for level was carried out according to the sensitive values of the sensitive attributes, if there were m sensitive attributes, there were m tables. Thirdly, each level was assigned a specific account α ij by the model. Finally, the ( α ij, k,m)-anonymity algorithm based on greedy strategy was designed, and a local optimum method was adopted to implement the ideas of the model which improves the degree of data privacy protection. The proposed model was compared with other three models from information loss, execution times, and the sensitivity distance of equivalent class. The experimental results show that, although the execution time of the proposed model is slightly longer than other compared models, however, the information loss is less and the privacy protection degree of data is higher. It can resist the associated attack and protect the data of multi-sensitive attributes.
Reference | Related Articles | Metrics