作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2015, Vol. 41 ›› Issue (1): 115-120. doi: 10.3969/j.issn.1000-3428.2015.01.021

• 安全技术 • 上一篇    下一篇

基于敏感度的个性化(α,l)-匿名方法

赵爽,陈力   

  1. 天津财经大学管理信息系统系,天津 300222
  • 收稿日期:2014-08-13 修回日期:2014-09-09 出版日期:2015-01-15 发布日期:2015-01-16
  • 作者简介:赵 爽(1989-),女,硕士研究生,主研方向:信息安全;陈 力,副教授。

Personalized (α,l)-anonymity Method Based on Sensitivity

ZHAO Shuang,CHEN Li   

  1. Department of Management Information Systems,Tianjin University of Finance & Economics,Tianjin 300222,China
  • Received:2014-08-13 Revised:2014-09-09 Online:2015-01-15 Published:2015-01-16

摘要: 目前多数隐私保护匿名模型不能满足面向敏感属性值的个性化保护需求,也未考虑敏感属性值的分布情况,易受相似性攻击。为此,提出基于敏感度的个性化(α,l)-匿名模型,通过为敏感属性值设置敏感度,并定义等敏感度组的概念,对等价类中各等敏感度组设置不同的出现频率,满足匿名隐私保护的个性化需求。通过限制等价类中同一敏感度的敏感属性值出现的总频率,控制敏感属性值的分布,防止相似性攻击。提出一种基于聚类的个性化(α,l)-匿名算法,实现匿名化处理。实验结果表明,该算法能以与其他l-多样性匿名模型近似的信息损失量和时间代价,提供更好的隐私保护。

关键词: 隐私保护, l-多样性, 敏感度, 聚类, 个性化, 相似性攻击

Abstract: Currently,the majority of anonymity model for privacy preservation neither meets the need of personalized preservation oriented to sensitive attribute values,nor considers the distribution of sensitive attribute values,therefore they are vulnerable to similarity attack.This paper proposes a personalized (α,l)-anonymity model based on sensitivity.This model provides sensitivity for different sensitive attribute values,and defines the concept of equ-sensitivity group,implements the personalized needs of privacy anonymity by setting the frequency constraints for different equ-sensitivity group in every equivalence class.This model also can defense similarity attack by limiting the total frequency of sensitive attribute values for same sensitivity in every equivalence class,and control the distribution of sensitive attribute values.This paper proposes a personalized (α,l)-anonymity algorithm based on clustering to achieve the purpose of anonymity.Experimental results show that the proposed algorithm provides better privacy preservation than other l-diversity anonymity models with the similar information loss and time cost.

Key words: privacy preservation, l-diversity, sensitivity, clustering, personalized, similarity attack

中图分类号: