2015
DOI: 10.1155/2015/464731
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Protection Method for Multiple Sensitive Attributes Based on Strong Rule

Abstract: At present, most studies on data publishing only considered single sensitive attribute, and the works on multiple sensitive attributes are still few. And almost all the existing studies on multiple sensitive attributes had not taken the inherent relationship between sensitive attributes into account, so that adversary can use the background knowledge about this relationship to attack the privacy of users. This paper presents an attack model with the association rules between the sensitive attributes and, accor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 12 publications
(38 reference statements)
0
19
0
Order By: Relevance
“…Maintaining anonymity against datasets with multiple sensitive attributes is an important and practical problem as we cannot always go with an assumption that datasets contain only one sensitive attribute. Although good progress on some scenarios have been made in [10,11,12,13,14,16,18,19,20] and this paper, the problem still at large remains open and challenging. All these paper have addressed the problem of multiple sensitive attributes but not in the context of personalization.…”
Section: Discussionmentioning
confidence: 97%
See 1 more Smart Citation
“…Maintaining anonymity against datasets with multiple sensitive attributes is an important and practical problem as we cannot always go with an assumption that datasets contain only one sensitive attribute. Although good progress on some scenarios have been made in [10,11,12,13,14,16,18,19,20] and this paper, the problem still at large remains open and challenging. All these paper have addressed the problem of multiple sensitive attributes but not in the context of personalization.…”
Section: Discussionmentioning
confidence: 97%
“…Yi,T. and Shi,M [18] presented that an attack method uses the association rules to get the users' privacy and accordingly presented a protection model. Through theoretical and experimental analysis, the authors proved that the new protection model can provide better protection for privacy, and it was able to preserve useful relationships in released tables.…”
Section: Related Workmentioning
confidence: 99%
“…But the rating technique can be attacked by applying association rules due to the relationship between sensitive attribute values. Yi et al [47] removed the weaknesses of the rating technique and eliminated the threat of association attack.…”
Section: Related Workmentioning
confidence: 99%
“…The above methods for multiple sensitive attributes do not consider the sensitive requirements of various sensitive attributes. Different sensitive attributes may have different sensitivity requirements, so the rating techniques for multiple sensitive attributes were introduced [46,47]. These rating techniques not only protect privacy for multiple sensitive attributes, but also keep a large amount of correlations of the microdata.…”
Section: Introductionmentioning
confidence: 99%
“…An adversary can use related bk to breach the privacy. e authors in [32] prevented the data from association attack and removed the weakness of the rating algorithm. In [37,38], the authors perform vertical partitioning (i.e., anatomy) and implement decomposition and decomposition plus, respectively, to achieve l-diversity for MSAs.…”
Section: Syntactic Anonymization Literature For Multiple Sensitive Atmentioning
confidence: 99%