(L, m, d) \#x2014; Anonymity : A Resisting Similarity Attack Model for Multiple Sensitive Attributes
Title | (L, m, d) \#x2014; Anonymity : A Resisting Similarity Attack Model for Multiple Sensitive Attributes |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Jia, J., Chen, L. |
Conference Name | 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) |
Keywords | (1, (l, anonymity, composability, d)-anonymity model, data privacy, data publishing, data release, dimension sensitive attribute, equivalence classes, Human Behavior, m, m)-diversity model, Metrics, multiple sensitive attributes similarity attack, multiple sensitive attributes situation, privacy preservation, privacy-preserving models, pubcrawl, resilience, Resiliency, resisting similarity attack model, semantic similarity, sensitive information leakage, similarity attack, trees (mathematics) |
Abstract | Preserving privacy is extremely important in data publishing. The existing privacy-preserving models are mostly oriented to single sensitive attribute, can not be applied to multiple sensitive attributes situation. Moreover, they do not consider the semantic similarity between sensitive attribute values, and may be vulnerable to similarity attack. In this paper, we propose a (l, m, d)-anonymity model for multiple sensitive attributes similarity attack, where m is the dimension of the sensitive attributes. This model uses the semantic hierarchical tree to analyze and compute the semantic dissimilarity between sensitive attribute values, and each equivalence class must exist at least l sensitive attribute values that satisfy d-different on each dimension sensitive attribute. Meanwhile, in order to make the published data highly available, our model adopts the distance-based measurement method to divide the equivalence class. We carry out extensive experiments to certify the (1, m, d)-anonymity model can significantly reduce the probability of sensitive information leakage and protect individual privacy more effectively. |
URL | http://ieeexplore.ieee.org/document/8284835/ |
DOI | 10.1109/ITNEC.2017.8284835 |
Citation Key | jia_l_2017 |
- Metrics
- trees (mathematics)
- similarity attack
- sensitive information leakage
- semantic similarity
- resisting similarity attack model
- Resiliency
- resilience
- pubcrawl
- privacy-preserving models
- privacy preservation
- multiple sensitive attributes situation
- multiple sensitive attributes similarity attack
- (1
- m)-diversity model
- m
- Human behavior
- equivalence classes
- dimension sensitive attribute
- data release
- data publishing
- data privacy
- d)-anonymity model
- composability
- anonymity
- (l