GSSK: A Generalization Step Safe Algorithm in Anonymizing Data
It is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked. To solve the problem, the condition of attack is analyzed, and a m-threshold model is p...
Saved in:
| Published in | 2010 International Conference on Communications and Mobile Computing Vol. 1; pp. 183 - 187 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.04.2010
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781424463275 1424463270 |
| DOI | 10.1109/CMC.2010.191 |
Cover
| Abstract | It is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked. To solve the problem, the condition of attack is analyzed, and a m-threshold model is presented to decide whether the value of quasi-identifier attribute would be continuously generalized, making use of algorithm of SSGK dealing with the model. Computer experiments show that the GSSK algorithm can prevent the attack with little information loss. |
|---|---|
| AbstractList | It is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked. To solve the problem, the condition of attack is analyzed, and a m-threshold model is presented to decide whether the value of quasi-identifier attribute would be continuously generalized, making use of algorithm of SSGK dealing with the model. Computer experiments show that the GSSK algorithm can prevent the attack with little information loss. |
| Author | Pin Lv Yu Wen-bing Chen Nian-sheng |
| Author_xml | – sequence: 1 surname: Pin Lv fullname: Pin Lv email: lpwhict@163.com organization: Sch. of Comput. Sci. & Eng., Wuhan Inst. of Technol., Wuhan, China – sequence: 2 surname: Yu Wen-bing fullname: Yu Wen-bing email: yuwit@sohu.com organization: Sch. of Sci., Wuhan Inst. of Technol., Wuhan, China – sequence: 3 surname: Chen Nian-sheng fullname: Chen Nian-sheng email: hschenns@163.com organization: Dept. of Comput. Sci., Hubei Normal Coll., Huangshi, China |
| BookMark | eNpVjr1OwzAURo2gErRkY2PxC6T4N_FlQIoCBEQRQ7pXjnNTjBKnSrK0T08QLHzLp7McnSW5CH1AQm44W3PO4C5_z9eC_RDwMxJBargSSiVSGHH-j1O9IEvBGICSkOhLEo3jF5untBBSX5GHoizf7mlGCww42Naf7OT7QMsJD7S0DdKs3feDnz476gPN5pJj508-7Omjnew1WTS2HTH6-xXZPj9t85d481G85tkm9sCmGGvrrEABWiYVqxWDRiunOHMK0bi5FB1aBDX3u6auDGg0FTirBedONHJFbn-1HhF3h8F3djjutEq5MiC_Ac63TGU |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CMC.2010.191 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9781424463282 1424463289 |
| EndPage | 187 |
| ExternalDocumentID | 5471489 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i90t-edaca2e29536b0d409f54c410c4ee8c446eceae94282cfdb895e8b9ca5211c2f3 |
| IEDL.DBID | RIE |
| ISBN | 9781424463275 1424463270 |
| IngestDate | Wed Aug 27 02:24:45 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2009943965 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-edaca2e29536b0d409f54c410c4ee8c446eceae94282cfdb895e8b9ca5211c2f3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_5471489 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-April |
| PublicationDateYYYYMMDD | 2010-04-01 |
| PublicationDate_xml | – month: 04 year: 2010 text: 2010-April |
| PublicationDecade | 2010 |
| PublicationTitle | 2010 International Conference on Communications and Mobile Computing |
| PublicationTitleAbbrev | cmc |
| PublicationYear | 2010 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000452235 |
| Score | 1.4412429 |
| Snippet | It is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 183 |
| SubjectTerms | Computer science Data privacy Educational institutions Generalization Intelligent robots k-anonymity Laboratories Mobile communication Mobile computing Protection Publishing |
| Title | GSSK: A Generalization Step Safe Algorithm in Anonymizing Data |
| URI | https://ieeexplore.ieee.org/document/5471489 |
| Volume | 1 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED21nZgKtIhveWAkbT7s2GZAqgqlAhUhtUjdKse-QAW0qEqX_nrsJA0IMbA5HhLrLOd8d--9A7gITKyQmdiLKEOPcq49xX3ucR0ZIQUTaQ6iGT3Gw2d6P2XTGlxWXBhEzMFn2HHDvJZvlnrtUmVdZv-kVMg61LmIC65WlU_JpcEjtuVuxVHIK0mn8plVwHfZ7Y_6Ba4rcOqcPxqr5H5l0ITRdkUFnOSts86Sjt78Emv875J3of3N4CNPlW_agxou9qG5beFAyhPdguu78fjhivRIKT9dsjKJA3-RsUqR9N5flqt59vpB5gtSJAvmG_tOcqMy1YbJ4HbSH3plSwVvLv3MQ6O0CjF0NdvENza2SxnVNPA1RRTamgk1KpQ2Jgl1ahIhGYpEamWdfKDDNDqAhv0QHgIJeZjay4S9QSgbwSmZxEHKA6f-HnETR_QIWs4as89CNGNWGuL47-kT2CnK8g4ScwqNbLXGM-vts-Q83-YvzBakRg |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED6VMsBUoEW88cBI2iax45gBqSqUQpsKqUXqVjn2BSIeRVW69NfjPBoQYmBzPCTWWc757r7vO4ALW3sSmfYslzK0KOfKkrzNLa5c7Quf-VEGoglGXv-JPkzZtAKXJRcGETPwGTbTYVbL13O1TFNlLWb-pNQXG7DJKKUsZ2uVGZVMHNxla_aW5zq8FHUqnlkJfRetbtDNkV12qs_5o7VK5ll6NQjWa8oBJa_NZRI21eqXXON_F70DjW8OH3ksvdMuVPBjD2rrJg6kONN1uL4bjwdXpEMKAeqCl0lS-BcZywhJ5-15voiTl3cSf5A8XRCvzDvJjUxkAya920m3bxVNFaxYtBMLtVTSQSet2oZtbaK7iFFF7baiiL4yZkKFEoWJShwV6dAXDP1QKGncvK2cyN2HqvkQHgBxuBOZ64S5Q0gTw0kRenbE7VT_3eXac-kh1FNrzD5z2YxZYYijv6fPYas_CYaz4f1ocAzbeZE-BcicQDVZLPHU-P4kPMu2_AudqaeT |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+International+Conference+on+Communications+and+Mobile+Computing&rft.atitle=GSSK%3A+A+Generalization+Step+Safe+Algorithm+in+Anonymizing+Data&rft.au=Pin+Lv&rft.au=Yu+Wen-bing&rft.au=Chen+Nian-sheng&rft.date=2010-04-01&rft.pub=IEEE&rft.isbn=9781424463275&rft.volume=1&rft.spage=183&rft.epage=187&rft_id=info:doi/10.1109%2FCMC.2010.191&rft.externalDocID=5471489 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/sc.gif&client=summon&freeimage=true |