期刊文献+

一种向量等价置换隐私保护数据干扰方法 被引量:6

Vector Equivalent Replacing Based Privacy-Preserving Perturbing Method
下载PDF
导出
摘要 近年来,隐私保护数据发布得到了研究者的广泛关注,聚类与隐藏原理上的差异使得面向聚类的隐藏成为难点.针对现有保距和保分布隐藏难以有效兼顾数据聚类可用性和隐私安全的不足,提出基于保邻域隐藏的扰动算法VecREP(vector equivalent replacing based perturbing method),通过分析数据点邻域组成结构,引入能够保持数据邻域组成稳定的安全邻域定义.进一步基于向量偏移与合成思想,提出有效保持邻域数据分布特征的等价置换弧.对任意数据点,采用随机选取位于其安全邻域内等价置换弧上点替换的策略实现隐藏.将算法与已有的RBT,TDR,Camp-crest和NeNDS算法进行实验比较,结果表明:VecREP算法具有与保距隐藏算法RBT相近的聚类可用性,优于其余算法,能够较好地维持数据聚类的可用性.同时,具有好于其余算法的数据隐私保护安全性. Privacy-Preserving data publishing has attracted considerable research interest over the past few years. The principle difference of clustering and obfuscating burdens the trade-off between clustering utility maintaining and privacy protection. Most of existing methods such as adopting strategies of distance-preservation, or distribution-preservation, cannot accommodate both clustering utility and privacy security of the data. As a trade-off, a neighborhood-preservation based perturbing algorithm VecREP (vector equivalent replacing based perturbing method) is proposed, which realizes good clustering utility by maintaining the nearest neighborhood for each data point. The definition of a safe neighborhood is introduced to stabilize the composition of the nearest neighborhood. The equivalent replacing arc is generated to realize distribution stability of nearest neighborhood leveraging vector offset and composition. For each data point, VecREP randomly chooses a point on its equivalent replacing arc inside corresponding safe neighborhood to make substitution. The algorithm is compared with existing methods such as RBT, TDR, Camp-crest and NeNDS. Experimental results demonstrate that VecREP competes in performance with RBT on maintaining clustering quality and, outperforms the other. It can avoid a reversible attack effectively and compared to the existing solution, ARMM has a shorter handover delay and a smaller location update and delivery cost.
出处 《软件学报》 EI CSCD 北大核心 2012年第12期3198-3208,共11页 Journal of Software
基金 国家自然科学基金(61003057)
关键词 隐私保护数据发布 聚类 安全邻域 等价置换弧 k邻域 privacy-preserving data publishing clustering safe neighborhood equivalent replacing arc k nearest neighborhood
  • 相关文献

参考文献4

二级参考文献130

共引文献291

同被引文献82

  • 1孔华锋,高云璐.云计算环境中柔性易扩展的信任协商机制研究[J].系统工程理论与实践,2011,31(S2):38-42. 被引量:6
  • 2宋国峰,梁昌勇.一种基于用户行为信任的云安全访问控制模型[J].中国管理科学,2013,21(S2):669-676. 被引量:16
  • 3袁禄来,曾国荪,王伟.基于Dempster-Shafer证据理论的信任评估模型[J].武汉大学学报(理学版),2006,52(5):627-630. 被引量:17
  • 4俞迪.支持隐私保护的数据挖掘研究[D].长沙:湖南大学,2009. 被引量:2
  • 5FUNG B C M, WANG K, CHEN R,et al. Privacy-preser-ving data publishing: a survey of recent developments[ J].ACM Comput Surv, 2010,42(4) : 1-53. 被引量:1
  • 6MACHANAVAJJHALA A,KIFER D,GEHRKE J, et al.L-diversity : privacy beyond k-anonymity [ J ]. ACM Trans-actions on Knowledge Discovery from Data,2007,1(1):1-52. 被引量:1
  • 7WONG R, LI J, FU A,et al. ( a,k)~ anonymous data pub-lishing [J ] ? Journal of Intelligent Information Systems,2009,33(2) : 209-234. 被引量:1
  • 8PARAMESWARAN R,BLOUGH D M. Privacy preservingdata obfuscation for inherently clustered data[ J]. Journal ofInformation and Computer Security, 2008 , 2(1) : 1744-1765. 被引量:1
  • 9MUKHERJEE S,CHEN Z Y,GANGOPADHYAY A. Aprivacy-preserving technique for Euclidean distance-basedmining algorithms using Fourier-related transforms [ J ].Journal on Very Large Data Bases, 2006, 15(4) : 293-315. 被引量:1
  • 10FUNGB C M, WANG K,WANG L Y, et al. Privacy-pre-serving data publishing for cluster analysis [ J ]. Data &Knowledge Engineering, 2009,68(6) :552-575. 被引量:1

引证文献6

二级引证文献112

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部