刘海涛, 王小亮, 赵珂, 宿连超, 徐明伟. 基于排序和动态规划的K-匿名隐私保护机制[J]. 山东电力技术, 2023, 50(4): 41-50.
引用本文: 刘海涛, 王小亮, 赵珂, 宿连超, 徐明伟. 基于排序和动态规划的K-匿名隐私保护机制[J]. 山东电力技术, 2023, 50(4): 41-50.
LIU Hai-tao, WANG Xiao-liang, ZHAO Ke, SU Lian-chao, XU Ming-wei. K-anonymity Privacy Protection Mechanism Basing on Sorting and Dynamic Programming[J]. Shandong Electric Power, 2023, 50(4): 41-50.
Citation: LIU Hai-tao, WANG Xiao-liang, ZHAO Ke, SU Lian-chao, XU Ming-wei. K-anonymity Privacy Protection Mechanism Basing on Sorting and Dynamic Programming[J]. Shandong Electric Power, 2023, 50(4): 41-50.

基于排序和动态规划的K-匿名隐私保护机制

K-anonymity Privacy Protection Mechanism Basing on Sorting and Dynamic Programming

  • 摘要: 随着数据共享在智能电网、医疗等领域应用程度的加深,隐私保护的问题也日益突出,而K-匿名作为一种隐私保护的先进理论,被广泛用于数据共享与分发。然而,在实现K-匿名机制的过程中,对于数据的泛化过程不可避免地会造成一些信息损失,因此如何在实现K-匿名的过程中尽可能地减少信息损失、保证数据可用性是一个值得研究的问题。针对此问题,提出一种基于排序与动态规划的K-匿名数据隐私保护算法(Anonymous Algorithm Based on Sorting and Dynamic Programming,AASDP)。以元组间的距离为基础对表中元组进行排序,通过动态规划找出满足K-匿名条件的最优聚类划分,从而保证数据泛化后的最优可用性。通过理论分析和实验,表明此算法能使信息损失最小化,并保证多项式级的时间复杂度。

     

    Abstract: With the deepening application of data sharing in smart grid,medical and other fields,the problem of privacy protection has become increasingly prominent.As an advanced theory of privacy protection,K-anonymity is widely used for data sharing and distribution.However,in the process of realizing K-anonymity mechanism,the generalization process of data will inevitably cause some information loss,so how to reduce information loss as much as possible and ensure data availability in the process of realizing K-anonymity is a problem worth studying.An anonymous algorithm based on sorting and dynamic programming(AASDP)was proposed. The tuples in the table were sorted based on the distance between tuples,and the optimal clustering partition satisfying the K-anonymity condition was found through dynamic programming to ensure the optimal availability of data after generalization.Theoretical and experimental analysis show that the proposed algorithm can minimize the loss of information and ensure polynomial time complexity.

     

/

返回文章
返回