2007
DOI: 10.1007/978-3-540-71703-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Efficient k-Anonymization Using Clustering Techniques

Abstract: Abstract. k-anonymization techniques have been the focus of intense research in the last few years. An important requirement for such techniques is to ensure anonymization of data while at the same time minimizing the information loss resulting from data modifications. In this paper we propose an approach that uses the idea of clustering to minimize information loss and thus ensure good data quality. The key observation here is that data records that are naturally similar to each other should be part of the sa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
231
1
3

Year Published

2008
2008
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 246 publications
(237 citation statements)
references
References 11 publications
(34 reference statements)
2
231
1
3
Order By: Relevance
“…Most of the local recoding generalization algorithms follow clustering based approach where each cluster should satisfy anonymity requirement [1,2,6,10,14,19,28]. [2] Proposed condensation based approach where the data is condensed into multiple groups having pre-defined size.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the local recoding generalization algorithms follow clustering based approach where each cluster should satisfy anonymity requirement [1,2,6,10,14,19,28]. [2] Proposed condensation based approach where the data is condensed into multiple groups having pre-defined size.…”
Section: Related Workmentioning
confidence: 99%
“…The key idea of this algorithm is to generate the equivalence classes based on density and is measured by k-nearest neighbour distance. Ji-Won Byun et al formulated greedy approach in which kanonymity problem is transformed into k-member clustering to attaining the privacy protection of the data [6]. A frame work called KACA to accomplish the k-anonymity,in which grouping of the tuples is done by attribute hierarchical structures [21].…”
Section: Related Workmentioning
confidence: 99%
“…To measure the loss of content information, we adopt the measurement introduced in [5]. The content information of a node consists of numerical attributes and hierarchical attributes.…”
Section: Loss Of Content Informationmentioning
confidence: 99%
“…Zheleva et al [15] proposed an edge clustering method which considers the content information attached to edges, but this method also causes the same problem as [5]. Wei et al [13] suggested a method that produces unconnected social networks.…”
Section: Introductionmentioning
confidence: 99%
“…We applied the cluster technique reported in [4]. To ensure that l-diversity is correctly enforced, two constraints are required when the clustering process is performed.…”
Section: + R M ) a Table Is Said To Have Recursive (C L)-diversitmentioning
confidence: 99%