• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Yubao, Huang Zhilan, Ada Wai Chee Fu, Yin Jian. A Data Privacy Preservation Method Based on Lossy Decomposition[J]. Journal of Computer Research and Development, 2009, 46(7): 1217-1225.
Citation: Liu Yubao, Huang Zhilan, Ada Wai Chee Fu, Yin Jian. A Data Privacy Preservation Method Based on Lossy Decomposition[J]. Journal of Computer Research and Development, 2009, 46(7): 1217-1225.

A Data Privacy Preservation Method Based on Lossy Decomposition

More Information
  • Published Date: July 14, 2009
  • Recently, privacy preserving data mining has been a hot topic in data mining research community. The data privacy preservation is one of the important issues of privacy preserving mining. Many methods have been presented for this problem. However, the existing methods often have the shortcomings of high loss distortion and less aggregate query accuracy on the private or anonymous dataset. In this paper, based on the existing (alpha, k) privacy preservation model, an improved method, Alpha+, is presented using the lossy decomposition theory of relation database. Alpha+ firstly use (alpha, k) method to generate the private dataset for the original database. Then the private dataset is projected into two separated tables NSS and SS. The two tables are related with each other through the same relation attributes and then the redundancy information of lossy join of them can be used to preserve the private information. Secondly, Alpha+ merges the same tuples of NSS and SS tables to reduce the size of them, and the modified NSS and SS are finally published. The security comparison analysis between Alpha+ and the other similar methods is also given. The experimental results show that Alpha+ outperforms the existing methods in terms of aggregate query accuracy on the private dataset.
  • Related Articles

    [1]Zhang Xiaojian, Xu Yaxin, Meng Xiaofeng. Approximate k-Nearest Neighbor Queries of Spatial Data Under Local Differential Privacy[J]. Journal of Computer Research and Development, 2022, 59(7): 1610-1624. DOI: 10.7544/issn1000-1239.20210397
    [2]Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
    [3]Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252.
    [4]Xu Yajun, Wang Chaokun, Shi Wei, Pan Peng, Wei Dongmei. k'/k-Dominant Skyline Query over Multiple Time Series[J]. Journal of Computer Research and Development, 2011, 48(10): 1859-1870.
    [5]Zhou Xun, Li Jianzhong, and Shi Shengfei. Distributed Aggregations for Two Queries over Uncertain Data[J]. Journal of Computer Research and Development, 2010, 47(5): 762-771.
    [6]Xu Hongbo, Hao Zhongxiao. An Approximate k-Closest Pair Query Algorithm Based on Z Curve[J]. Journal of Computer Research and Development, 2008, 45(2): 310-317.
    [7]Liao Wei, Jing Ning, Zhong Zhinong, and Chen Hongsheng. An Efficient Prediction Technique for Range Aggregation of Moving Objects[J]. Journal of Computer Research and Development, 2007, 44(6): 1015-1021.
    [8]Cai Jianyu, Wu Quanyuan, Jia Yan, and Zou Peng. Research on Aggregate Query Matching in Semantic Cache[J]. Journal of Computer Research and Development, 2006, 43(12): 2124-2130.
    [9]Zhuang Yi, Zhuang Yueting, and Wu Fei. k Nearest Neighbor Queries Based on Data Grid[J]. Journal of Computer Research and Development, 2006, 43(11): 1876-1885.
    [10]Chen Xiqian, Wang Zhanchang, Cao Xiukun, Chi Zhongxian. An Efficient Indexing Scheme for Range Aggregate Queries in Spatial Data Warehouse[J]. Journal of Computer Research and Development, 2006, 43(1): 75-80.

Catalog

    Article views (700) PDF downloads (707) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return