期刊文献+

动态多敏感属性匿名保护多线程并行算法 被引量:2

Multi-thread parallel algorithm for dynamic multiple sensitive attributes anonymous protection
下载PDF
导出
摘要 文章通过建立伪记录表,将新添加的记录与伪记录进行匹配,创造删除伪记录的机会,以达到减少匿名数据集中伪记录的目的,将记录桶进行分割,设计实现一种动态多敏感属性匿名保护的多线程并行算法c-m-inv。实验结果表明,算法c-m-inv高效、生成的多敏感属性匿名数据集具有较高的可用性。 A table of counterfeits is created, and the new added records are compared with the counter- feits to delete some counterfeits and reduce the total number of counterfeits in the anonymous dataset. The record buckets are split, and a multi-thread parallel algorithm c-m-inv for dynamic multiple sensi- tive attributes anonymous protection is designed. The experimental results show that the algorithm c- m-inv is efficient and the anonymous dataset generated by it has high serviceability.
作者 唐印浒 钟诚
出处 《合肥工业大学学报(自然科学版)》 CAS 北大核心 2017年第9期1204-1208,共5页 Journal of Hefei University of Technology:Natural Science
基金 广西自然科学基金资助项目(2014GXNSFAA118396 2011GXNSFA018152)
关键词 数据匿名 多敏感属性 m-不变性 多线程并行 data anonymization multiple sensitive attribute rn-invariance multi-thread parallel
  • 相关文献

参考文献5

二级参考文献23

  • 1武毅,王丹,蒋宗礼.基于事务型K-Anonymity的动态集值属性数据重发布隐私保护方法[J].计算机研究与发展,2013,50(S1):248-256. 被引量:7
  • 2Machanavajjhala A,Gehrke J,Kifer D.l-diversity:privacy beyond k-anonymity[].Proc of IEEE Int’l Conf on Data Engineering.2006 被引量:1
  • 3LeFevre K,DeWitt D J,Ramakrishnan R.Mondrian multidimensional k-anonymity[].Proc of IEEE Int’l Conf on Data Engineering.2006 被引量:1
  • 4Wang K,Fung B C M.Anonymizing sequential releases[].Proc of the ACM Sigkdd Int’l Conf on Knowledge Discovery and Data Mining.2006 被引量:1
  • 5Asuncion A,Newman D J.UCImachine learning repository. http://mlearn.ics.uci.edu/MLRepository.html . 2007 被引量:1
  • 6Bayardo R,Agrawal R.Data privacy through optimal k-anonymization[].Proc of IEEE Int’l Conf on Data Engineering.2005 被引量:1
  • 7Sweeney L.K-anonymity: a model for protecting privacy[].International Journal on UncertaintyFuzziness and Knowledge-Based Systems.2002 被引量:1
  • 8P Samarati.Protecting Respondents’Identities in M icrodata Release[].IEEE Transactions on Know ledge and Data Engineering.2001 被引量:1
  • 9Meyerson A,Williams R.On the complexity of optimal k-anonymity[].Proceedings of the Twenty-third ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems(PODS).2004 被引量:1
  • 10H. Park,K. Shim.Approximate algorithms for k-anonymity[].Proc of ACM SIGMOD.2007 被引量:1

共引文献12

同被引文献22

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部