学科分类
/ 1
2 个结果
  • 简介:Althoughk-anonymityisagoodwayofpublishingmicrodataforresearchpurposes,itcannotresistseveralcommonattacks,suchasattributedisclosureandthesimilarityattack.Toresisttheseattacks,manyrefinementsofk-anonymityhavebeenproposedwitht-closenessbeingoneofthestrictestprivacymodels.Whilemostexistingt-closenessmodelsaddressthecaseinwhichtheoriginaldatahaveonlyonesinglesensitiveattribute,datawithmultiplesensitiveattributesaremorecommoninpractice.Inthispaper,wecoverthisgapwithtwoproposedalgorithmsformultiplesensitiveattributesandmakethepublisheddatasatisfyt-closeness.Basedontheobservationthatthevaluesofthesensitiveattributesinanyequivalenceclassmustbeasspreadaspossibleovertheentiredatatomakethepublisheddatasatisfyt-closeness,bothofthealgorithmsusedifferentmethodstopartitionrecordsintogroupsintermsofsensitiveattributes.Oneusesaclusteringmethod,whiletheotherleveragestheprincipalcomponentanalysis.Then,accordingtothesimilarityofquasi-identifierattributes,recordsareselectedfromdifferentgroupstoconstructanequivalenceclass,whichwillreducethelossofinformationasmuchaspossibleduringanonymization.Ourproposedalgorithmsareevaluatedusingarealdataset.Theresultsshowthattheaveragespeedofthefirstproposedalgorithmisslowerthanthatofthesecondproposedalgorithmbuttheformercanpreservemoreoriginalinformation.Inaddition,comparedwithrelatedapproaches,bothproposedalgorithmscanachievestrongerprotectionofprivacyandreduceless.

  • 标签: data PRIVACY K-ANONYMITY t-closeness MULTIPLE sensitive
  • 简介:Whilecloud-basedBPM(BusinessProcessManagement)showspotentialsofinherentscalabilityandexpenditurereduction,suchissuesasuserautonomy,privacyprotectionandefficiencyhavepoppedupasmajorconcerns.Usersmayhavetheirownrudimentaryorevenfull-edgedBPMsystems,whichmaybeembodiedbylocalEAIsystems,attheirend,butstillintendtomakeuseofcloud-sideinfrastructureservicesandBPMcapabilities,whichmayappearasPaaS(Platform-as-a-Service)services,atthesametime.Awholebusinessprocessmaycontainanumberofnon-compute-intensiveactivities,forwhichcloudcomputingisover-provision.Moreover,someusersfeardataleakageandlossofprivacyiftheirsensitivedataisprocessedinthecloud.Thispaperproposesandanalyzesanovelarchitectureofcloud-basedBPM,whichsupportsuser-enddistributionofnon-compute-intensiveactivitiesandsensitivedata.Anapproachtooptimaldistributionofactivitiesanddataforsyntheticallyutilizingbothuser-endandcloud-sideresourcesisdiscussed.Experimentalresultsshowthatwiththehelpofsuitabledistributionschemes,dataprivacycanbesatisfactorilyprotected,andresourcesonbothsidescanbeutilizedatlowercost.

  • 标签: 业务流程管理 敏感数据 用户端 计算 密集 架构