A Multi-phase K-anonymity Algorithm Based on Clustering Techniques

5Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We proposed a new k-anonymity algorithm to publish datasets with privacy protection. We improved clustering techniquesto lower data distort and enhance diversity of sensitive attributes values. Our algorithm includes four phases. Tuples are distributed to several groups in phase one. Tuples in a group own same sensitive value. In phase two, groups smaller than the threshold merge and then they are partitioned into several clusters according to quasi-identifier attributes. Each cluster would become an equivalence class. In phase three, remainder tuples are distributed to clusters evenly to satisfy L-diversity. Finally, quasi-identifier attributes values in each cluster are generalized to satisfy k-anonymity. We used OCC dataset to compare our algorithm with classic method based on clustering. Empirical results showed that our algorithm could be used to publish datasets with high security and limited information loss. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Liu, F., Jia, Y., & Han, W. (2013). A Multi-phase K-anonymity Algorithm Based on Clustering Techniques. In Communications in Computer and Information Science (Vol. 320, pp. 365–372). Springer Verlag. https://doi.org/10.1007/978-3-642-35795-4_46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free