K-Anonymity through the Enhanced Clustering Method

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

19 Citations (Scopus)

Abstract

With the rise of the Social Web, there is increasingly more tendency to share personal records, and even make them publicly available on the Internet. However, such a wide spread disclosure of personal data has raised serious privacy concerns. If the released dataset is not properly anonymized, individual privacy will be at great risk. K-anonymity is a popular and practical approach to anonymize datasets. In this study, we use a new clustering approach to achieve k-anonymity through enhanced data distortion that assures minimal information loss. During a clustering process, we include an additional constraint, minimal information loss, which is not incorporated into traditional clustering approaches. Our proposed algorithm supports a data release process such that data will not be distorted more than they are needed to achieve k-anonymity. We also develop more appropriate metrics for measuring the quality of generalization. The new metrics are suitable for both numeric and categorical attributes. Our experimental results show that the proposed algorithm causes significantly less information loss than existing clustering algorithms.
Original languageEnglish
Title of host publicationProceedings - 13th IEEE International Conference on E-Business Engineering, ICEBE 2016 - Including 12th Workshop on Service-Oriented Applications, Integration and Collaboration, SOAIC 2016
PublisherIEEE
Pages85-91
ISBN (Print)9781509061198
DOIs
Publication statusPublished - Nov 2016
Event13th IEEE International Conference on E-Business Engineering, ICEBE 2016 - Macau, China
Duration: 4 Nov 20166 Nov 2016

Conference

Conference13th IEEE International Conference on E-Business Engineering, ICEBE 2016
PlaceChina
CityMacau
Period4/11/166/11/16

Research Keywords

  • Clustering
  • Generalization
  • K-anonymity
  • Privacy
  • Suppression

Fingerprint

Dive into the research topics of 'K-Anonymity through the Enhanced Clustering Method'. Together they form a unique fingerprint.

Cite this