skip to main content
10.1145/3056662.3056668acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicscaConference Proceedingsconference-collections
research-article

Enhanced (k,e)-anonymous for categorical data

Published: 26 February 2017 Publication History

Abstract

Currently, the information is available in the organizations to gain more utilities together with some reason such as improving the strategy of organization, research, or etc.,. For this reason, the data holder cannot avoid to share some existing data-collecting of organization to be outside the scope. Hence, before the data is shared to be outside the scope of data-collecting, the data holder must be confidence the shared data cannot be re-identified to the owner again. The (k,e)-Anonymous is one of the most of prominent models in term of privacy preservation. However, the traditional (k,e)-Anonymous model is designed to support only the numeric-sensitive attribute. In the real-world, the domain of sensitive attribute can be other data domains such as the categorical-sensitive, ordinal-sensitive, or etc.,. Therefore, in this work, we propose the extended capability of (k,e)-Anonymous to supports the sensitive attribute that is the categorical data-type in conjunction with the DFS algorithm and the post-order traversal.

References

[1]
Q. Zhang, N. Koudas, D. Srivastava and T. Yu. 2007. Aggregate Query Answering on Anonymized Tables. IEEE 23rd International Conference on Data Engineering. Istanbul. pp. 116--125.
[2]
Latanya Sweeney. 2002. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10, 5 (October 2002), 557--570.
[3]
Latanya Sweeney. 2002. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10, 5 (October 2002), 571--588.
[4]
Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. 2007. L- diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1, 1, Article 3 (March 2007).
[5]
N. Li, T. Li and S. Venkatasubramanian. 2007. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. 2007 IEEE 23rd International Conference on Data Engineering, Istanbul. pp. 106--115.
[6]
Surapon Riyana, Nattapon Harnsamut, Torsak Soontornphand, and Juggapong Natwichai. 2015. (k, e)- Anonymous for Ordinal Data. In Proceedings of the 2015 18th International Conference on Network-Based Information Systems (NBIS '15). IEEE Computer Society, Washington, DC, USA, 489--493.
[7]
P. Samarati. 2001. Protecting Respondents' Identities in Microdata Release. IEEE Trans. on Knowl. and Data Eng. 13, 6 (November 2001), 1010--1027.
[8]
Kristen LeFevre, David J. DeWitt, and Raghu Ramakrishnan. 2005. Incognito: efficient full-domain K-anonymity. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data (SIGMOD '05). ACM, New York, NY, USA, 49--60.
[9]
Cen Li and Gautam Biswas. 2002. Unsupervised Learning with Mixed Numeric and Nominal Data. IEEE Trans. on Knowl. and Data Eng. 14, 4 (July 2002), 673--690.
[10]
Jiawei Han and Micheline Kamber. 2000. Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
[11]
M. F. Abdullah and K. Ahmad. 2013. The mapping process of unstructured data to structured data. 2013 International Conference on Research and Innovation in Information Systems (ICRIIS), Kuala Lumpur, 2013, pp. 151--155.
[12]
S. Morasca. 2004 On the definition and use of aggregate indices for nominal, ordinal, and other scales. 10th International Symposium on Software Metrics, 2004. Proceedings., 2004, pp. 46--57.
[13]
C. C. Hsu and S. H. Lin. Visualized Analysis of Mixed Numeric and Categorical Data Via Extended Self-Organizing Map. 2012. in IEEE Transactions on Neural Networks and Learning Systems, vol. 23, no. 1, pp. 72--86, Jan. 2012.
[14]
R. Tarjan. Depth-first search and linear graph algorithms. 1971. 12th Annual Symposium on Switching and Automata Theory (swat 1971), East Lansing, MI, USA, 1971, pp. 114--121.
[15]
Chen, G.H., Yu, M., Liu, L. 1998. Two algorithms for constructing a binary tree from its traversals. Information Processing Letters 28 (1988) 297 -- 299.
[16]
A. Asuncion, D.N. 2007. UCI machine learning repository (2007).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICSCA '17: Proceedings of the 6th International Conference on Software and Computer Applications
February 2017
339 pages
ISBN:9781450348577
DOI:10.1145/3056662
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 February 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. (k,e)- anonymous
  2. DFS
  3. aggregate query
  4. categorical data
  5. privacy preservation

Qualifiers

  • Research-article

Conference

ICSCA 2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media