• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xu Yong, Qin Xiaolin, Yang Yitao, Yang Zhongxue, Huang Can. A QI Weight-Aware Approach to Privacy Preserving Publishing Data Set[J]. Journal of Computer Research and Development, 2012, 49(5): 913-924.
Citation: Xu Yong, Qin Xiaolin, Yang Yitao, Yang Zhongxue, Huang Can. A QI Weight-Aware Approach to Privacy Preserving Publishing Data Set[J]. Journal of Computer Research and Development, 2012, 49(5): 913-924.

A QI Weight-Aware Approach to Privacy Preserving Publishing Data Set

More Information
  • Published Date: May 14, 2012
  • In recent years, publishing data about individuals without revealing their identity information has become an active issue, and k-anonymity based models are the effective techniques that can prevent linking attacks. Most of the previous works, however, focus on the efficiency and the scope of application of the models. Specific requirements of quality of published microdata for the analyzing task in various scenarios and the difference of contributions of each QI attribute to the result have not been addressed. If the contribution of different generalizing paths and orders of QI attributes has not been considered, the published microdata may have bad utility in the application. Paying more attention to them, which makes the published table have different utility, is valuable. By analyzing the differences among several application areas, a scheme which provides an effective and secure tradeoff of privacy and utility, is proposed. Firstly the basic ODP is revised to indicate the characters of special domain. Secondly, the weight on quasi-attribute is introduced to reflect the effect for the data analyzing task. And then QI weight-aware k-anonymity (WAK), which is an algorithm based on the weight of attribute, is introduced. Theoretical analysis and experimental results testify that the scheme is effective and can preserve privacy of the sensitive data well, meanwhile maintaining better data utility.
  • Related Articles

    [1]Zhang Jing, Ju Jialiang, Ren Yonggong. Double-Generators Network for Data-Free Knowledge Distillation[J]. Journal of Computer Research and Development, 2023, 60(7): 1615-1627. DOI: 10.7544/issn1000-1239.202220024
    [2]Zhang Xiaojian, Chen Li, Jin Kaizhong, Meng Xiaofeng. Private High-Dimensional Data Publication with Junction Tree[J]. Journal of Computer Research and Development, 2018, 55(12): 2794-2809. DOI: 10.7544/issn1000-1239.2018.20170756
    [3]Zhang Ting, Du Yi, Huang Tao, Li Xue. A Reconstruction Method for Spatial Data Using Parallel SNESIM[J]. Journal of Computer Research and Development, 2015, 52(6): 1431-1442. DOI: 10.7544/issn1000-1239.2015.20140356
    [4]Zhu Yelei, Wang Yujun, Luo Qiang, and Tao Qing. A Soft-Thresholding Coordinate Descent Algorithm for Solving Truncated Hinge Loss[J]. Journal of Computer Research and Development, 2013, 50(11): 2295-2303.
    [5]Qi Yafei, Wang Yijie, and Li Xiaoyong. A Skyline Query Method over Gaussian Model Uncertain Data Streams[J]. Journal of Computer Research and Development, 2012, 49(7): 1467-1473.
    [6]Lei Shaohua, Han Yinhe, and Li Xiaowei. Soft Error Rate Analysis for Combinational Logic Using Frequency Method[J]. Journal of Computer Research and Development, 2011, 48(3): 535-544.
    [7]Sun Yan, Zhang Minxuan, Li Shaoqing, and Gao Changlei. Optimizing Soft Error Rate and Overhead of Circuits Based on Sensitive Registers Replacement[J]. Journal of Computer Research and Development, 2011, 48(1): 28-35.
    [8]Zhang Ting, Lu Detang, Li Daolun, Du Yi. Research on Statistical Information Reconstruction of Images Based on Multiple-Point Geostatistics Integrating Soft Data with Hard Data[J]. Journal of Computer Research and Development, 2010, 47(1): 43-52.
    [9]Zou Yan, Lu Peizhong, and Zhu Xueling. A Novel Algorithm of Soft Fast Correlation Attack and Applications[J]. Journal of Computer Research and Development, 2007, 44(4): 581-588.
    [10]Huang Hailin, Tang Zhimin, Xu Tong. Fault Injection and Soft Error Sensitivity Characterization for Fault-Tolerant Godson-1 Processor[J]. Journal of Computer Research and Development, 2006, 43(10): 1820-1827.

Catalog

    Article views (827) PDF downloads (563) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return