• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Liang, Wang Weiping, Meng Dan. Privacy Preserving Data Publishing via Weighted Bayesian Networks[J]. Journal of Computer Research and Development, 2016, 53(10): 2343-2353. DOI: 10.7544/issn1000-1239.2016.20160465
Citation: Wang Liang, Wang Weiping, Meng Dan. Privacy Preserving Data Publishing via Weighted Bayesian Networks[J]. Journal of Computer Research and Development, 2016, 53(10): 2343-2353. DOI: 10.7544/issn1000-1239.2016.20160465

Privacy Preserving Data Publishing via Weighted Bayesian Networks

More Information
  • Published Date: September 30, 2016
  • Privacy preserving in data publishing is a hot topic in the field of information security currently. How to effectively prevent the disclosure of sensitive information has become a major issue in enabling public access to the published dataset that contain personal information. As a newly developed notion of privacy preserving, differential privacy can provide strong security protection due to its greatest advantage of not making any specific assumptions on the attacker's background, and has been extensively studied. The existing approaches of differential privacy cannot fully and effectively solve the problem of releasing high-dimensional data. Although the PrivBayes can transform high-dimensional data to low-dimensional one, but cannot prevent attributes disclosure on certain conditions, and also has some limitations and shortcomings. In this paper, to solve these problems, we propose a new and powerful improved algorithm for data publishing called weighted PrivBayes. In this new algorithm, thorough both theoretical analysis and experiment evaluation, not only guarantee the security of the published dataset but also significantly improve the data accuracy and practical value than PrivBayes.
  • Related Articles

    [1]Wang Xiujun, Mo Lei, Zheng Xiao, Wei Linna, Dong Jun, Liu Zhi, Guo Longkun. Sampling Based Fast Publishing Algorithm with Differential Privacy for Data Stream[J]. Journal of Computer Research and Development, 2024, 61(10): 2433-2447. DOI: 10.7544/issn1000-1239.202440481
    [2]Hong Jinxin, Wu Yingjie, Cai Jianping, Sun Lan. Differentially Private High-Dimensional Binary Data Publication via Attribute Segmentation[J]. Journal of Computer Research and Development, 2022, 59(1): 182-196. DOI: 10.7544/issn1000-1239.20200701
    [3]Wang Leixia, Meng Xiaofeng. ESA: A Novel Privacy Preserving Framework[J]. Journal of Computer Research and Development, 2022, 59(1): 144-171. DOI: 10.7544/issn1000-1239.20201042
    [4]Zhang Yuxuan, Wei Jianghong, Li Ji, Liu Wenfen, Hu Xuexian. Graph Degree Histogram Publication Method with Node-Differential Privacy[J]. Journal of Computer Research and Development, 2019, 56(3): 508-520. DOI: 10.7544/issn1000-1239.2019.20170886
    [5]Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei. Trajectory Privacy Preserving Based on Statistical Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. DOI: 10.7544/issn1000-1239.2017.20160647
    [6]Wu Yingjie, Zhang Liqun, Kang Jian, Wang Yilei. An Algorithm for Differential Privacy Streaming Data Adaptive Publication[J]. Journal of Computer Research and Development, 2017, 54(12): 2805-2817. DOI: 10.7544/issn1000-1239.2017.20160555
    [7]Ouyang Jia, Yin Jian, Liu Shaopeng, Liu Yubao. An Effective Differential Privacy Transaction Data Publication Strategy[J]. Journal of Computer Research and Development, 2014, 51(10): 2195-2205. DOI: 10.7544/issn1000-1239.2014.20130824
    [8]Wu Yingjie, Tang Qingming, Ni Weiwei, Sun Zhihui, Liao Shangbin. A Clustering Hybrid Based Algorithm for Privacy Preserving Trajectory Data Publishing[J]. Journal of Computer Research and Development, 2013, 50(3): 578-593.
    [9]Xu Yong, Qin Xiaolin, Yang Yitao, Yang Zhongxue, Huang Can. A QI Weight-Aware Approach to Privacy Preserving Publishing Data Set[J]. Journal of Computer Research and Development, 2012, 49(5): 913-924.
    [10]Chong Zhihong, Ni Weiwei, Liu Tengteng, and Zhang Yong. A Privacy-Preserving Data Publishing Algorithm for Clustering Application[J]. Journal of Computer Research and Development, 2010, 47(12).
  • Cited by

    Periodical cited type(42)

    1. 解金鑫,王睿,杨艳胜,徐善之,左兆迎. 基于区块链技术的检验检测机构信息化建设研究. 智能制造. 2025(01): 17-20 .
    2. 于丰瑞. 网络威胁技战术情报自动化识别提取研究综述. 计算机工程与应用. 2024(13): 1-22 .
    3. 李鸣,宋文鹏,宗燕,刘冕宸. 基于区块链的元宇宙生态体系架构. 计算机研究与发展. 2024(09): 2364-2383 . 本站查看
    4. 蔡翔,丁全,汪玉. 基于博弈论的网络安全实战攻防策略研究. 微型电脑应用. 2024(10): 164-168 .
    5. 刘金,秦媛媛,田晓娜,郝娇,韩庆敏. 开源网络威胁情报技术研究综述. 智能计算机与应用. 2024(11): 24-34 .
    6. 罗琴,杨根,刘智,唐宾徽. 结合主动学习的威胁情报IOC识别方法. 电子科技大学学报. 2023(01): 108-115 .
    7. 郑万波,陈慧敏,吴燕清,夏云霓. 基于应急救援的信息共享策略仿真. 计算机应用. 2023(01): 306-311 .
    8. 王克平,张亚男,王艺,车尧. 基于区块链思维的竞争情报联盟运行机制研究. 情报科学. 2023(02): 29-35+43 .
    9. 赵斌,姜雪(??),周洋. 基于区块链技术的在线电子商务信用信息共享方法. 情报科学. 2023(01): 158-165 .
    10. 王琳. 基于区块链的粮食应急情报体系构建研究. 情报杂志. 2023(06): 124-130+207 .
    11. 查德平,徐艺扬,尧玉恒. 基于联防联控架构的网络威胁情报系统设计. 现代电子技术. 2023(14): 63-67 .
    12. 徐彬,黄春麟,吴迪,滑斌. 面向分布式网络入侵检测的实验测试仿真. 计算机仿真. 2023(08): 413-416 .
    13. 吴越,亚军,孙现玲,周景贤,吕宗平. 基于区块链的民航网络安全威胁情报共享方案. 中国民航大学学报. 2023(04): 16-22 .
    14. 王付宇,张影影,郑炜晨. 电商违规记录共享区块链模型及实现机理研究. 哈尔滨商业大学学报(自然科学版). 2023(06): 668-675 .
    15. 李悦. 反恐情报信息决策性证据智能检索机制研究. 情报杂志. 2022(01): 45-51 .
    16. 孙辉. 基于区块链的网络安全技术研究. 长江信息通信. 2022(01): 167-169 .
    17. 姜鑫,王飞. 基于联盟区块链的网络威胁情报共享平台. 电脑与信息技术. 2022(01): 50-52 .
    18. 王昱,盛暘,薛星群. 区块链技术与互联网金融风险防控路径研究. 科学学研究. 2022(02): 257-268 .
    19. 蔡琨,闫宇,郑正广,张云,叶秀泳. 基于区块链技术的数字生活运营数据共享应用. 长江信息通信. 2022(03): 230-232 .
    20. 郭金鹏,杨廉正. 基于区块链的公安情报共享优化研究. 网络安全技术与应用. 2022(04): 128-130 .
    21. 刘淑艳,李丽芬. 基于信息隐藏的无线共享网络数据防篡改方法. 兵器装备工程学报. 2022(04): 265-270 .
    22. 张亚昊,胡威,节骜. 多源情报融合分析技术的研究与应用:以电网企业为例. 武汉理工大学学报(信息与管理工程版). 2022(02): 220-226 .
    23. 李宏伟,潘志远,黄继杰. 一种基于双勾函数的数据加密算法研究. 计算机技术与发展. 2022(06): 120-125 .
    24. 冯景瑜,张琪,黄文华,韩刚. 基于跨链交互的网络安全威胁情报共享方案. 信息网络安全. 2022(05): 21-29 .
    25. 陈丽燕. 区块链智能合约在商业数据中的应用研究. 现代计算机. 2022(09): 109-112 .
    26. 陈伟雄,杨晓晨,春增军,李若兰,张华. 电力企业网络安全威胁情报管理体系的研究与实践. 电信科学. 2022(07): 184-189 .
    27. 边娜. 基于区块链的隐私信息安全共享技术. 现代传输. 2022(04): 60-63 .
    28. 刘峰,杨杰,齐佳音. 区块链密码学隐私保护技术综述. 网络与信息安全学报. 2022(04): 29-44 .
    29. 张睿. 网络安全态势感知模型的构建. 信息记录材料. 2022(07): 67-70 .
    30. 朱勇. 基于区块链的智能安防社区可信数据共享方法. 自动化与仪器仪表. 2022(08): 50-53+57 .
    31. 林志达,张华兵,曹小明,卢伟开. 基于堡垒机技术的企业信息网络安全防护模型. 电子设计工程. 2022(18): 179-183 .
    32. 张书钦,白光耀,李红,张敏智. 多源数据融合的物联网安全知识推理方法. 计算机研究与发展. 2022(12): 2735-2749 . 本站查看
    33. 白健,董贵山,安红章,廖思捷. 基于区块链的数据共享解决方案. 信息安全与通信保密. 2021(01): 21-31 .
    34. 张冬冬. 基于区块链技术的反恐情报融合共享模型研究. 情报杂志. 2021(02): 69-76+62 .
    35. 时翌飞,冯景瑜,黄鹤翔,曹旭栋,王鹤,张玉清. 安全漏洞国际披露政策研究. 信息安全研究. 2021(03): 215-224 .
    36. 李林蔚. 基于区块链的代理重加密信息共享及安全多方计算模型. 长江信息通信. 2021(02): 107-110 .
    37. 戴晓苗,刘丹,马一凡. 基于博弈论的安全威胁情报共享机制研究. 信息与电脑(理论版). 2021(08): 43-46 .
    38. 姜鑫,王飞. 区块链技术与应用综述. 电脑与电信. 2021(05): 25-29 .
    39. 庞微波. 关于区块链的网络安全技术综述. 网络安全技术与应用. 2021(11): 21-23 .
    40. 程兵. 考虑不对称性的网络安全威胁情报共享模型研究. 信息与电脑(理论版). 2021(23): 219-221 .
    41. 刘思彤,张占月,许益乔,王冠生. 基于区块链的航天侦察资源运用模式. 指挥信息系统与技术. 2021(06): 52-57+84 .
    42. 杜良丽,王兵. 应用型高校线性代数课程教学模式研究——以数据科学与大数据技术专业为例. 萍乡学院学报. 2020(03): 98-101+106 .

    Other cited types(17)

Catalog

    Article views (1575) PDF downloads (554) Cited by(59)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return