Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society 2008
DOI: 10.1145/1379287.1379297
|View full text |Cite
|
Sign up to set email alerts
|

An efficient clustering method for k-anonymization

Abstract: The k-anonymity model is a privacy-preserving approach that has been extensively studied for the past few years. To minimize the information loss due to anonymization, it is crucial to group similar data together and then anonymize each group individually. This work proposes a clusteringbased k-anonymization method that runs in O( , the experiments show that our method outperforms their method with respect to information loss and resilience to outliers.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 70 publications
(30 citation statements)
references
References 11 publications
(17 reference statements)
0
30
0
Order By: Relevance
“…Several anonymization approaches have been proposed in the literature [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18] to preserve the privacy and enhance the data utility. The -diversity model [13] is one of the widely used anonymization based approaches.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Several anonymization approaches have been proposed in the literature [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18] to preserve the privacy and enhance the data utility. The -diversity model [13] is one of the widely used anonymization based approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, clustering based anonymization approaches such as systematic clustering for the -diversity model [5], greedy k-member clustering algorithm [6], Mondrian algorithm [7], Loukides and Shao [8], weighted featuremeans clustering algorithm [9], one pass -mean clustering algorithm [10], and systematic clustering approach foranonymity [11] were suggested. However, these anonymization based clustering approaches could not be able to produce an optimal cluster.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the k-anonymization problem is viewed as a clustering problem. Clustering-based approaches [7,27,16,34] search a cluster that has k-records. In full-domain generalization, there are two heuristic approaches for generalization algorithms: the top-down approach and the bottom-up approach.…”
Section: Related Workmentioning
confidence: 99%
“…The paper titled "An Efficient Clustering Method for k-Anonymization" [6] proposed a new clustering method for k-anonymization. The authors argued that in order to minimize the information loss due to anonymization, it is crucial to group similar data together and then anonymize each group individually.…”
Section: K-anonymization and Its Applicationsmentioning
confidence: 99%