TY - GEN
T1 - Multi-level privacy preserving k-anonymity
AU - Weng, Jui Hung
AU - Chi, Po Wen
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021/8
Y1 - 2021/8
N2 - k-anonymity is a well-known definition of privacy, which guarantees that any person in the released dataset cannot be distinguished from at least k-1 other individuals. In the protection model, the records are anonymized through generalization or suppression with a fixed value of k. Accordingly, each record has the same level of anonymity in the published dataset. However, different people or items usually have inconsistent privacy requirements. Some records need extra protection while others require a relatively low level of privacy constraint. In this paper, we propose Multi-Level Privacy Preserving K-Anonymity, an advanced protection model based on k-anonymity, which divides records into different groups and requires each group to satisfy its respective privacy requirement. Moreover, we present a practical algorithm using clustering techniques to ensure the property. The evaluation on a real-world dataset confirms that the proposed method has the advantages of offering more flexibility in setting privacy parameters and providing higher data utility than traditional k-anonymity.
AB - k-anonymity is a well-known definition of privacy, which guarantees that any person in the released dataset cannot be distinguished from at least k-1 other individuals. In the protection model, the records are anonymized through generalization or suppression with a fixed value of k. Accordingly, each record has the same level of anonymity in the published dataset. However, different people or items usually have inconsistent privacy requirements. Some records need extra protection while others require a relatively low level of privacy constraint. In this paper, we propose Multi-Level Privacy Preserving K-Anonymity, an advanced protection model based on k-anonymity, which divides records into different groups and requires each group to satisfy its respective privacy requirement. Moreover, we present a practical algorithm using clustering techniques to ensure the property. The evaluation on a real-world dataset confirms that the proposed method has the advantages of offering more flexibility in setting privacy parameters and providing higher data utility than traditional k-anonymity.
KW - Anonymization
KW - Data privacy
KW - k-anonymity
UR - http://www.scopus.com/inward/record.url?scp=85116773200&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85116773200&partnerID=8YFLogxK
U2 - 10.1109/AsiaJCIS53848.2021.00019
DO - 10.1109/AsiaJCIS53848.2021.00019
M3 - Conference contribution
AN - SCOPUS:85116773200
T3 - Proceedings - 2021 16th Asia Joint Conference on Information Security, AsiaJCIS 2021
SP - 61
EP - 67
BT - Proceedings - 2021 16th Asia Joint Conference on Information Security, AsiaJCIS 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 16th Asia Joint Conference on Information Security, AsiaJCIS 2021
Y2 - 19 August 2021 through 20 August 2021
ER -