Advanced Search
    Song Jinling, Liu Guohua, Huang Liming, Zhu Caiyun. Algorithms to Find the Set of Relevant Views and Quasi-Identifiers for K-Anonymity Method[J]. Journal of Computer Research and Development, 2009, 46(1): 77-88.
    Citation: Song Jinling, Liu Guohua, Huang Liming, Zhu Caiyun. Algorithms to Find the Set of Relevant Views and Quasi-Identifiers for K-Anonymity Method[J]. Journal of Computer Research and Development, 2009, 46(1): 77-88.

    Algorithms to Find the Set of Relevant Views and Quasi-Identifiers for K-Anonymity Method

    More Information
    • Published Date: January 14, 2009
    • Quasi-identifier is a key factor to impact the validity of k-anonymity method. If the quasi-identifier is not identified correctly, the publishing view may still disclose secret information although it has been k-anonymized on the quasi-identifier. In the procedure of publishing views, an important problem concerning identifying quasi-identifiers is how to find all the views relevant to the publishing view from the set of published views. By mapping the set of published views and the publishing view into a hypergraph, the problem of finding the set of relevant views can be converted to searching for all the paths containing special edge between two given nodes in the hypergraph. In this paper, at first, the method mapping all the views to hypergraph and the related lemma and deciding theorems are presented; the algorithm for finding the set of relevant views based on hypergraph is proposed too. Secondly, the composing structures of the quasi-identifiers for the basic table with FDs and without FDs are studied respectively, and the characters of quasi-identifiers are generalized. Then, the algorithms to identify quasi-identifiers of the publishing view based on the set of relevant views for the cases with and without FDs are proposed. At last, the correctness of all the algorithms are proved, and the time complexity of these algorithms are analyzed. The algorithms finding the set of relevant views and quasi-identifiers can ensure the successful application of the k-anonymity method.
    • Related Articles

      [1]Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang. Malicious Domain Detection Technology Based on Semantic Graph Learning[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440375
      [2]Xiao Mengnan, He Ruifang, Ma Jinsong. Event Detection Based on Hierarchical Latent Semantic-Driven Network[J]. Journal of Computer Research and Development, 2024, 61(1): 184-195. DOI: 10.7544/issn1000-1239.202220447
      [3]Yao Siyu, Zhao Tianzhe, Wang Ruijie, Liu Jun. Rule-Guided Joint Embedding Learning of Knowledge Graphs[J]. Journal of Computer Research and Development, 2020, 57(12): 2514-2522. DOI: 10.7544/issn1000-1239.2020.20200741
      [4]Cheng Xiaoyang, Zhan Yongzhao, Mao Qirong, Zhan Zhicai. Video Semantic Analysis Based on Topographic Sparse Pre-Training CNN[J]. Journal of Computer Research and Development, 2018, 55(12): 2703-2714. DOI: 10.7544/issn1000-1239.2018.20170579
      [5]Tong Ming, Ding Liwei, and Ji Chenglong. Fusion of HCRF and AAM Highlight Events Detection in Soccer Videos[J]. Journal of Computer Research and Development, 2014, 51(1): 225-236.
      [6]Huang Tianqiang, Yu Yangqiang, Guo Gongde, Qin Xiaolin. Trajectory Outlier Detection Based on Semi-Supervised Technology[J]. Journal of Computer Research and Development, 2011, 48(11): 2074-2082.
      [7]Liu Sipei, Liu Dayou, Qi Hong, and Guan Jinghua. Composing Semantic Web Service with Description Logic Rules[J]. Journal of Computer Research and Development, 2011, 48(5): 831-840.
      [8]Li Haibo, Zhan Dechen, Xu Xiaofei. Integration Verification of Workflow Business Rule Semantic[J]. Journal of Computer Research and Development, 2009, 46(7): 1143-1151.
      [9]Zhang Maoyuan, Zou Chunyan, Lu Zhengding. A Fuzzy Classification of Web Pages Based on the Transposition-Learning Rule[J]. Journal of Computer Research and Development, 2007, 44(1): 99-104.
      [10]Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.
    • Cited by

      Periodical cited type(0)

      Other cited types(1)

    Catalog

      Article views (953) PDF downloads (801) Cited by(1)

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return