|
|
Data Masking Analysis Based on Internet Big Data |
Zhou Qianyi(), Wang Yamin, Wang Chuang |
School of Economics and Management, Xidian University, Xi’an 710126, China |
|
|
Abstract [Objective] This paper aims to improve the classification results of anonymous groups and then obtain better data masking model and algorithm. [Methods] First, we modified the dimension judgment standards based on k-anonymity. Then, we used the KD tree as storage structure to construct a new algorithm. Third, we implemented the proposed algorithm with Python. Finally, we examined the feasibility and effectiveness of the new algorithm with the number of anonymous groups and the percentage of NCP. [Results] The new algorithm could maximize the number of anonymous groups generated by the whole dataset, while the percentage of NCP was lower than similar algorithms. [Limitations] For datasets with significant degree of dispersion, the dimension of the loop computation was cumbersome. [Conclusions] The proposed algorithm could improve the availability of the anonymous groups and reduce the data loss.
|
Received: 15 August 2017
Published: 07 March 2018
|
|
[1] |
穆良, 程良伦. 基于k-匿名位置隐私保护的自适应学习模型[J]. 计算机工程与应用, 2017, 53(18): 89-94, 101.
|
[1] |
(Mu Liang, Cheng Lianglun.Adaptive Learning Model Based on K-anonymity Location Privacy Protection[J]. Computer Engineering and Applications, 2017, 53(18): 89-94, 101.)
|
[2] |
叶云, 石聪聪, 余勇, 等. 保护隐私的分布式朴素贝叶斯挖掘[J]. 应用科学学报, 2017, 35(1): 1-10.
doi: 10.3969/j.issn.0255-8297.2017.01.001
|
[2] |
(Ye Yun, Shi Congcong, Yu Yong, et al.Privacy-Preserving Distributed Naive Bayes Data Mining[J]. Journal of Applied Sciences— Electronics and Information Engineering, 2017, 35(1): 1-10.)
doi: 10.3969/j.issn.0255-8297.2017.01.001
|
[3] |
王静, 闫仁武, 刘亚梅. 多敏感属性K-匿名模型的实现[J]. 计算机与数字工程, 2017, 45(7): 1368-1372.
|
[3] |
(Wang Jing, Yan Renwu, Liu Yamei.Implementation of K-anonymous Model with Multi-sensitive Attributes[J]. Computer & Digital Engineering, 2017, 45(7): 1368-1372.)
|
[4] |
王良, 王伟平, 孟丹. FVS k-匿名: 一种基于k-匿名的隐私保护方法[J]. 高技术通讯, 2015, 25(3): 228-238.
doi: 10.3772/j.issn.1002-0470.2015.03.002
|
[4] |
(Wang Liang, Wang Weiping, Meng Dan.FVS K-anonymity: An Anonymous Privacy Protection Method Based on K-anonymity[J]. Chinese High Technology Letters, 2015, 25(3): 228-238.)
doi: 10.3772/j.issn.1002-0470.2015.03.002
|
[5] |
郑路倩, 韩建民, 鲁剑锋, 等. 抵制时空位置点链接攻击的(k, δ, l)-匿名模型[J]. 计算机科学与探索, 2015, 9(9): 1108-1121.
doi: 10.3778/j.issn.1673-9418.1409079
|
[5] |
(Zheng Luqian, Han Jianmin, Lu Jianfeng, et al.(k, δ, l)-Anonymity Model to Resist Spatio-Temporal Point Linkage Attack[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(9): 1108-1121.)
doi: 10.3778/j.issn.1673-9418.1409079
|
[6] |
吴英杰. 隐私保护数据发布: 模型与算法[M]. 北京: 清华大学出版社, 2015: 7-16.
|
[6] |
(Wu Yingjie.Privacy Preserving Data Publishing: Models and Algorithms [M]. Beijing: Tsinghua University Press, 2015: 7-16.)
|
[7] |
吴英杰, 唐庆明, 倪巍伟, 等. 基于取整划分函数的k匿名算法[J]. 软件学报, 2012, 23(8): 2138-2148.
doi: 10.3724/SP.J.1001.2012.04157
|
[7] |
(Wu Yingjie, Tang Qingming, Ni Weiwei, et al.Algorithm for k-Anonymity Based on Rounded Partition Function[J]. Journal of Software, 2012, 23(8): 2138-2148.)
doi: 10.3724/SP.J.1001.2012.04157
|
[8] |
Xu J, Wang W, Pei J, et al.Utility-Based Anonymization Using Local Recording[C]//Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(SIGKDD). 2006: 785-790.
|
[9] |
Ghinita G, Karras P, Kalnis P, et al.Fast Data Anonymization with Low Information Loss[C]//Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB Endowment. 2007: 758-769.
|
[10] |
陈天莹, 陈剑锋. 大数据环境下的智能数据脱敏系统[J]. 通信技术, 2016, 49(7): 915-922.
|
[10] |
(Chen Tianying, Chen Jianfeng.Intelligent Data Masking System for Big Data Productive Environment[J]. Communications Technology, 2016, 49(7): 915-922.)
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|