Abstract
The M-Distinct is an excellent model that supports the anonymization of a fully dynamic set of data. This study aimed to explore and analyze the M-Distinct model. First of all, sensitive values in the QI-Group have certain randomness which caused the M-Distinct model prone to be property attacked. However, the (M, CUS)-Distinct model was proposed and required additional records in anonymity in the process. Therefore, its QI-Group-sensitive attribute value must belong to the same set of CUS to reduce the probability of property attacks. Secondly, the M-Distinct model involved time and cost. The proposed (M, CUS)-Distinct model creation phase generated disjoint barrel queues to ensure that each record could be stored in the record distribution phase, which reduced the time complexity of the algorithm. Finally, the experiment based on real data sets showed that the (M, CUS)-Distinct model was superior to the M-Distinct model in terms of data security, faked records processing, and execution time.
Similar content being viewed by others
References
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 571–588 (2002)
Wong, R., Li, J., Fu, A.: (α, k)-Anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 754–759. ACM, Philadelphia (2006)
Wang, K., Fung, B.: Anonymizing sequential releases. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 414–423. ACM, New York (2006)
Byun, J.W., Sohn, Y., Bertino, E.: Secure anonymization for incremental datasets. In: Workshop on Secure Data Management, pp. 48–63. Springer, Berlin (2006)
Wu, Y., Ni, W., Zhang, B., Yan, L., Sun, Z.: k-APPRP: a partitioning based privacy preserving k-anonymous algorithm for republication of incremental datasets. J. Chin. Comput. Syst. 8, 1581–1587 (2009)
Xiao, X., Tao, Y.: M-invariance: towards privacy preserving re-publication of dynamic datasets. In: Proceedings of ACM SIGMOD Conference on Management of Data, pp. 689–700. ACM, New York (2007)
Bu, Y., Fu, C., Wong, W.: Privacy preserving serial data publishing by role composition. In: Proceedings of the VLDB Endowment, pp. 845–856. ACM, New York (2008)
Joly, Y., Dyke, S., Knoppers, B.M.: Are data sharing and privacy protection mutually exclusive? Cell 167(5), 1150–1154 (2016)
Chen, P., Su, J., Zhao, B.: An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing. Secur. Commun. Netw. 9(14), 2302–2312 (2016)
Buccafurri, F., Fotia, L., Lax, G.: Analysis-preserving protection of user privacy against information leakage of social-network likes. Inf. Sci. 328(2), 340–358 (2016)
Memon, I., Arain, A.: Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web Internet Web Inf. Syst. 20(4), 639–672 (2017)
Xiong, J., Li, F., Ma, J.: A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Netw. Appl. 8(6), 1025–1037 (2015)
Krontiris, I., Dimitriou, T.: A platform for privacy protection of data requesters and data providers in mobile sensing. Comput. Commun. 65(1), 43–54 (2015)
Kalogridis, G., Sooriyabandara, M., Fan, Z.: Toward unified security and privacy protection for smart meter networks. IEEE Syst. J. 8(2), 641–654 (2014)
Hwang, R.-H., Hsueh, Y.-L., Chung, H.-W.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126–139 (2014)
Wen, Y.D., Meikang, Q., Longfei, Q., Longbin, C., Ana, W.: Who moved my data? Privacy protection in smartphones. IEEE Commun. Mag. 55(1), 20–25 (2017)
Zhang, Z., Qin, Z., Zhu, L., Weng, J., Ren, K.: Cost-friendly differential privacy for smart meters: exploiting the dual roles of the noise. IEEE Trans. Smart Grid. 8(2), 619–626 (2017)
Marta, B., Javier, G., Aythami, M., Julian, F.: Privacy-preserving comparison of variable-length data with application to biometric template protection. IEEE Access. 5, 8606–8619 (2017)
Anna, R.: The necessity of the implementation of privacy by design in sectors where data protection concerns arise. Comput. Law Secur. Rev. 34(1), 99–110 (2018)
Zulfiqar, A., Muhammad, I., Mansour, A., Tanveer, Z.: A zero-watermarking algorithm for privacy protection in biomedical signals. Futur. Gen. Comput. Syst. 82(5), 290–303 (2018)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ren, Xy., Zhang, P. & Zhou, Yq. Distinct model on privacy protection of dynamic data publication. Cluster Comput 22 (Suppl 6), 15127–15136 (2019). https://doi.org/10.1007/s10586-018-2506-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2506-3