Skip to main content
Log in

Clustering-based privacy preserving anonymity approach for table data sharing

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Government data sharing can effectively improve the efficiency and quality of government services and enhance the ability of providing government services. However, data sharing may bring the risk of citizen privacy leakage. It is a challenging problem on improving government governance and service levels when sharing government data while guaranteed citizens’ privacy. For the diversity types and complex attributes of government data, this paper proposes a cluster-based anonymous table data sharing privacy protection method (CATDS). Firstly, preprocessing the data table. According to the correlation degree between attributes, the clustering algorithm is used to divide the data attribute column to generate multiple tables. That can reduce the data dimension and improve the algorithm execution speed. Then clustering the table data using k-medoids clustering algorithm to generate a clustering result table that initially satisfies the ķ-anonymity requirement. That can reduce the next generalization degree and improve the data availability. Finally, anonymizing the resulting clusters through generalization technique to ensure the privacy of the shared data. By comparing the CATDS with the Incognito algorithm which is a classical ķ-anonymity algorithm, it is proved that the proposed algorithm can effectively reduce the amount of information loss and improve the availability of shared table data while protecting the private information of shared table data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Aggarwal G, Feder T, Kenthapadi K (2006) Achieving anonymity via clustering. In: Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. ACM, pp 153–162

  • Cramér H (2016) Mathematical methods of statistics (PMS-9). Princeton University Press, Princeton

    Google Scholar 

  • Dong L (2013) Classification mining based on privacy protection. Urban Construction Theory Research: Electronic Edition 22

  • Fang B, Jia Y, Li A, Jiang R (2016) Summary of big data privacy protection technology. Big Data 2(01):1–18

    Google Scholar 

  • Gao Y (2017) Research on key technologies of privacy protection in data publishing. Beijing University of Posts and Telecommunications

  • Greenacre M, Primicerio R (2013) Measures of distance between samples: noneuclidean. Multivariate analysis of ecological data 5-1

  • He Z, He Z (2005) E-government information resource sharing and protection of personal information privacy. J Intell 3:2–4

    Google Scholar 

  • Huang R, Liu L (2017) Personal privacy protection issues and countermeasures in the government data opening of China. Library 10:1–5

    Google Scholar 

  • Huang R, Miao W (2017) Security protection countermeasures of Chinese government open data. E-Government 5:28–36

    Google Scholar 

  • Jiang H, Zeng G, Ma H (2017) Greedy clustering anonymous method for table data publishing privacy protection. Softw J 28(02):341–351

    MathSciNet  MATH  Google Scholar 

  • Lin JL, Wen TH, Hsieh JC et al (2010) Density-based microaggregation for statistical disclosure control. Expert Syst Appl 37(4):3256–3263

    Google Scholar 

  • Liu X, Li Q (2016) Differential privacy protection data publishing method based on clustering anonymization. Commun J 37(05):125–129

    Google Scholar 

  • Liu L, Luo R (2017) Research on government data opening and personal privacy protection from the perspective of big data. Inf Sci 35(2):112–118

    Google Scholar 

  • Liu F, Fan H, Jin S, Jia Y (2012) A new k-anonymous privacy protection algorithm. Inf Netw Secur 08:199–202

    Google Scholar 

  • Meng Y (2017) Research on inter-departmental sharing mechanism of government information resources under E-government. China Manag Informationization 22:149–150

    Google Scholar 

  • Rousseeuw PJ (1987) Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J Comput Appl Math 20:53–65

    MATH  Google Scholar 

  • The General Office of the State Council (2017) Notice of the general office of the state council on printing and distributing the implementation plan for the integration and sharing of the government information system [EB/OL]

  • Wang P, Wang J (2010) Research progress on anonymized privacy preserving technology. Appl Res Comput 27(06):2016–2019

    Google Scholar 

  • Wang F, Chu J, Zhang Q et al (2017) Inter-departmental government data sharing: problems, reason and countermeasures. Libr Inf 5:54–62

    Google Scholar 

  • Xin L, Feng GAO (2012) Privacy protection method in E-government information sharing. J Comput Appl 32(1):82–85

    Google Scholar 

  • Yongbin Y (2014) Research on privacy preserving method data sharing, PhD thesis. Harbin Engineering University

  • Yuan Y (2014) Privacy protection method and research in data sharing. Harbin Engineering University

  • Yue S, Wu W, Gu Y (2017) Research on k-anonymity privacy preserving technology in data release. Software 38(11):12–17

    Google Scholar 

  • Zhang Y (2012) Research on sensitive information protection in data sharing. Dalian Maritime University

  • Zhang X, Wang W, Tang C (2016) Research on policy and regulations of Chinese and American government data opening and personal privacy protection. Inf Stud Theory Appl 39(1):38–43

    Google Scholar 

Download references

Funding

Funding was provided by Guidelines for the Application of Big Data in Housing & Urban-Rural Development areas (Grant No. 335016).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ning Song.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Piao, C., Liu, L., Shi, Y. et al. Clustering-based privacy preserving anonymity approach for table data sharing. Int J Syst Assur Eng Manag 11, 768–773 (2020). https://doi.org/10.1007/s13198-019-00834-5

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-019-00834-5

Keywords

Navigation