GSSK: A Generalization Step Safe Algorithm in Anonymizing Data

It is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked. To solve the problem, the condition of attack is analyzed, and a m-threshold model is p...

Full description

Saved in:
Bibliographic Details
Published in2010 International Conference on Communications and Mobile Computing Vol. 1; pp. 183 - 187
Main Authors Pin Lv, Yu Wen-bing, Chen Nian-sheng
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.04.2010
Subjects
Online AccessGet full text
ISBN9781424463275
1424463270
DOI10.1109/CMC.2010.191

Cover

Abstract It is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked. To solve the problem, the condition of attack is analyzed, and a m-threshold model is presented to decide whether the value of quasi-identifier attribute would be continuously generalized, making use of algorithm of SSGK dealing with the model. Computer experiments show that the GSSK algorithm can prevent the attack with little information loss.
AbstractList It is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked. To solve the problem, the condition of attack is analyzed, and a m-threshold model is presented to decide whether the value of quasi-identifier attribute would be continuously generalized, making use of algorithm of SSGK dealing with the model. Computer experiments show that the GSSK algorithm can prevent the attack with little information loss.
Author Pin Lv
Yu Wen-bing
Chen Nian-sheng
Author_xml – sequence: 1
  surname: Pin Lv
  fullname: Pin Lv
  email: lpwhict@163.com
  organization: Sch. of Comput. Sci. & Eng., Wuhan Inst. of Technol., Wuhan, China
– sequence: 2
  surname: Yu Wen-bing
  fullname: Yu Wen-bing
  email: yuwit@sohu.com
  organization: Sch. of Sci., Wuhan Inst. of Technol., Wuhan, China
– sequence: 3
  surname: Chen Nian-sheng
  fullname: Chen Nian-sheng
  email: hschenns@163.com
  organization: Dept. of Comput. Sci., Hubei Normal Coll., Huangshi, China
BookMark eNpVjr1OwzAURo2gErRkY2PxC6T4N_FlQIoCBEQRQ7pXjnNTjBKnSrK0T08QLHzLp7McnSW5CH1AQm44W3PO4C5_z9eC_RDwMxJBargSSiVSGHH-j1O9IEvBGICSkOhLEo3jF5untBBSX5GHoizf7mlGCww42Naf7OT7QMsJD7S0DdKs3feDnz476gPN5pJj508-7Omjnew1WTS2HTH6-xXZPj9t85d481G85tkm9sCmGGvrrEABWiYVqxWDRiunOHMK0bi5FB1aBDX3u6auDGg0FTirBedONHJFbn-1HhF3h8F3djjutEq5MiC_Ac63TGU
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CMC.2010.191
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9781424463282
1424463289
EndPage 187
ExternalDocumentID 5471489
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-edaca2e29536b0d409f54c410c4ee8c446eceae94282cfdb895e8b9ca5211c2f3
IEDL.DBID RIE
ISBN 9781424463275
1424463270
IngestDate Wed Aug 27 02:24:45 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009943965
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-edaca2e29536b0d409f54c410c4ee8c446eceae94282cfdb895e8b9ca5211c2f3
PageCount 5
ParticipantIDs ieee_primary_5471489
PublicationCentury 2000
PublicationDate 2010-April
PublicationDateYYYYMMDD 2010-04-01
PublicationDate_xml – month: 04
  year: 2010
  text: 2010-April
PublicationDecade 2010
PublicationTitle 2010 International Conference on Communications and Mobile Computing
PublicationTitleAbbrev cmc
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452235
Score 1.4412429
Snippet It is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous...
SourceID ieee
SourceType Publisher
StartPage 183
SubjectTerms Computer science
Data privacy
Educational institutions
Generalization
Intelligent robots
k-anonymity
Laboratories
Mobile communication
Mobile computing
Protection
Publishing
Title GSSK: A Generalization Step Safe Algorithm in Anonymizing Data
URI https://ieeexplore.ieee.org/document/5471489
Volume 1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED21nZgKtIhveWAkbT7s2GZAqgqlAhUhtUjdKse-QAW0qEqX_nrsJA0IMbA5HhLrLOd8d--9A7gITKyQmdiLKEOPcq49xX3ucR0ZIQUTaQ6iGT3Gw2d6P2XTGlxWXBhEzMFn2HHDvJZvlnrtUmVdZv-kVMg61LmIC65WlU_JpcEjtuVuxVHIK0mn8plVwHfZ7Y_6Ba4rcOqcPxqr5H5l0ITRdkUFnOSts86Sjt78Emv875J3of3N4CNPlW_agxou9qG5beFAyhPdguu78fjhivRIKT9dsjKJA3-RsUqR9N5flqt59vpB5gtSJAvmG_tOcqMy1YbJ4HbSH3plSwVvLv3MQ6O0CjF0NdvENza2SxnVNPA1RRTamgk1KpQ2Jgl1ahIhGYpEamWdfKDDNDqAhv0QHgIJeZjay4S9QSgbwSmZxEHKA6f-HnETR_QIWs4as89CNGNWGuL47-kT2CnK8g4ScwqNbLXGM-vts-Q83-YvzBakRg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED6VMsBUoEW88cBI2iax45gBqSqUQpsKqUXqVjn2BSIeRVW69NfjPBoQYmBzPCTWWc757r7vO4ALW3sSmfYslzK0KOfKkrzNLa5c7Quf-VEGoglGXv-JPkzZtAKXJRcGETPwGTbTYVbL13O1TFNlLWb-pNQXG7DJKKUsZ2uVGZVMHNxla_aW5zq8FHUqnlkJfRetbtDNkV12qs_5o7VK5ll6NQjWa8oBJa_NZRI21eqXXON_F70DjW8OH3ksvdMuVPBjD2rrJg6kONN1uL4bjwdXpEMKAeqCl0lS-BcZywhJ5-15voiTl3cSf5A8XRCvzDvJjUxkAya920m3bxVNFaxYtBMLtVTSQSet2oZtbaK7iFFF7baiiL4yZkKFEoWJShwV6dAXDP1QKGncvK2cyN2HqvkQHgBxuBOZ64S5Q0gTw0kRenbE7VT_3eXac-kh1FNrzD5z2YxZYYijv6fPYas_CYaz4f1ocAzbeZE-BcicQDVZLPHU-P4kPMu2_AudqaeT
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+International+Conference+on+Communications+and+Mobile+Computing&rft.atitle=GSSK%3A+A+Generalization+Step+Safe+Algorithm+in+Anonymizing+Data&rft.au=Pin+Lv&rft.au=Yu+Wen-bing&rft.au=Chen+Nian-sheng&rft.date=2010-04-01&rft.pub=IEEE&rft.isbn=9781424463275&rft.volume=1&rft.spage=183&rft.epage=187&rft_id=info:doi/10.1109%2FCMC.2010.191&rft.externalDocID=5471489
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/sc.gif&client=summon&freeimage=true