A Tree Based (m,k)-Anonymity Privacy Preserving Technique For Tabular Data

碩士 === 國立中興大學 === 電機工程學系所 === 107 === Data Publishing contributes to the advancement of data science and the application of knowledge-based decision making. However, data publishing faces the problems of privacy leakage. Once the data is published, sensitive information may be excavated and results...

Full description

Bibliographic Details
Main Authors: Hsu-Heng Chou, 周盱衡
Other Authors: Hsiao-Ping Tsai
Format: Others
Language:en_US
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/646dv4
Description
Summary:碩士 === 國立中興大學 === 電機工程學系所 === 107 === Data Publishing contributes to the advancement of data science and the application of knowledge-based decision making. However, data publishing faces the problems of privacy leakage. Once the data is published, sensitive information may be excavated and results in virtual or physical threats and attacks. For example, the ID of an anonymous user may be recognized and the information that he/she is reluctant to bring to light is revealed. More seriously, the revealing of one’s physical location could hazard his/her life safety. Therefore, data should be carefully examined and go through a privacy protection handling process before being released. Nowadays, k-anonymity is still one of the most frequently used privacy preserving model and generalization and perturbation are the common anonymity techniques. However, most of the generalization or perturbation techniques do not consider the data characteristics of high dimensionality thus leads to low data utilization. For handling the privacy preserving problem of high dimensional data, we consider that it is not easy for adversaries to obtain many data attributes to proceed privacy attacks. On the other hand, it is not easy to determine the quasi-identifier attributes. Instead of making all attributes k-anonymized, ensuring any m sub-dimensions of data attributes conform to the k-anonymity condition is probably a compromise to trade of the privacy preserving and data utility. Therefore, to handle the (m,k)-anonymity problem of a tabular data, we propose the (m,k)-anonymity algorithm with a Combination-Tree (C-Tree). The (m,k)-anonymity algorithm searches the C-Tree in a greedy and top-down manner to generalize the attributes of unqualified data records. The C-Tree is built based on the Pascal Theorem to summarize the data for easy of searching the unqualified data and figuring out the equivalent classes for local generalization. Also, we propose the Taxonomy Index Support (TIS) to speed the generalization process. To validate our methods, we conduct experiments with real dataset to study the key factors that influence the Information Loss and utility. According to the experimental results, our method outperforms the previous methods in achieving k-anonymity with lower Information Loss. Besides, the experimental results show a long computing time which is due to the high computational complexity. The future works include designing efficient data structures or algorithms to make the technique serviceable.