Systematic clustering method for l-diversity model
Paper
Paper/Presentation Title | Systematic clustering method for l-diversity model |
---|---|
Presentation Type | Paper |
Authors | Kabir, Md Enamul (Author), Wang, Hua (Author), Bertino, Elisa (Author) and Chi, Yunxiang (Author) |
Editors | Shen, Heng Tao and Bouguettaya, Athman |
Journal or Proceedings Title | Conferences in Research and Practice in Information Technology (CRPIT) |
ERA Conference ID | 42492 |
Journal Citation | 104, pp. 93-102 |
Number of Pages | 10 |
Year | 2010 |
Place of Publication | Sydney, Australia |
ISBN | 9781920682859 |
Web Address (URL) of Paper | http://crpit.com/Vol104.html |
Conference/Event | ADC 2010: 21st Australasian Conference on Database Technologies |
Australasian Database Conference | |
Event Details | Australasian Database Conference ADC Rank B B B B B B B B B B B B B B B B |
Event Details | ADC 2010: 21st Australasian Conference on Database Technologies Event Date 18 to end of 22 Jan 2010 Event Location Brisbane, Australia |
Abstract | Nowadays privacy becomes a major concern and many research efforts have been dedicated to the development of privacy protecting technology. Anonymization techniques provide an e±cient approach to protect data privacy. We recently proposed a systematic clustering1 method based on k- anonymization technique that minimizes the information loss and at the same time assures data quality. In this paper, we extended our previous work on the systematic clustering method to l-diversity model that assumes that every group of indistinguishable records contains at least l distinct sensitive attributes values. The proposed technique adopts to group similar data together with l-diverse sensitive values and then anonymizes each group individually. The structure of systematic clustering problem for l-diversity model is defined, investigated through paradigm and is implemented in two steps, namely clustering step for k- anonymization and l-diverse step. Finally, two algorithms of the proposed problem in two steps are developed and shown that the time complexity is in O(n^2/k) in the first step, where n is the total number of records containing individuals concerning their privacy and k is the anonymity parameter for k-anonymization. |
Keywords | privacy; k-anonymity; l-diversity; systematic clustering |
ANZSRC Field of Research 2020 | 469999. Other information and computing sciences not elsewhere classified |
460401. Cryptography | |
460508. Information retrieval and web search | |
Public Notes | File reproduced in accordance with the copyright policy of the publisher/author. |
Byline Affiliations | Department of Mathematics and Computing |
Purdue University, United States | |
Toowoomba Pearl Company, Australia |
https://research.usq.edu.au/item/9zq5v/systematic-clustering-method-for-l-diversity-model
Download files
2006
total views414
total downloads7
views this month1
downloads this month