DocumentCode :
2925251
Title :
K-anonymity on sensitive transaction items
Author :
Wang, Shyue-Liang ; Tsai, Yu-Chuan ; Kao, Hung-Yu ; Hong, Tzung-Pei
Author_Institution :
Dept. of Inf. Manage. Eng., Nat. Univ. of Kaohsiung, Kaohsiung, Taiwan
fYear :
2011
fDate :
8-10 Nov. 2011
Firstpage :
723
Lastpage :
727
Abstract :
K-anonymity-based techniques [9], [11], [15]-[17] have been the main anonymization techniques on relational data ad transactional data to protect privacy against re-identification attacks. Assuming the existence of both sensitive attributes and quasi-identifier (QI) attributes, a relational dataset D is k-anonymous if every record in D has at least k-1 other records with identical quasi-identifier attribute values, but with different sensitive attribute values. However, existing k-anonymity on transactional data treats all items as quasi-identifiers. The anonymized data set has k identical transactions in groups and suffered from lower data utility [6]-[7][10][18]-[19]. In this work, we propose a new anonymity concept on transactional data with quasi-identifier items and sensitive items (SI). For a transaction that contains sensitive items, there must exist at least k-1 other identical transactions [5][20]. For a transaction that does not contain sensitive item, no anonymization is required. A transactional data set satisfying this property is called sensitive k-anonymous. We proposed two algorithms, Sensitive Transaction Neighbors (STN) and Gray Sort Clustering (GSC), by adding/deleting QI items and adding SI items to achieve sensitive k-anonymity on transactional data. Extensive numerical experiments were given to demonstrate the characteristics of the proposed concept and approaches.
Keywords :
data privacy; pattern clustering; anonymization techniques; gray sort clustering; k-anonymity based techniques; privacy protection; quasi identifier attributes; reidentification attacks; relational data; sensitive transaction items; sensitive transaction neighbors; transactional data; Clustering algorithms; Data privacy; Itemsets; Privacy; Publishing; Reflective binary codes; Silicon; anonymization; privacy preservation; sensitive k-anonymity; transaction data;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Granular Computing (GrC), 2011 IEEE International Conference on
Conference_Location :
Kaohsiung
Print_ISBN :
978-1-4577-0372-0
Type :
conf
DOI :
10.1109/GRC.2011.6122687
Filename :
6122687
Link To Document :
بازگشت