Item type |
学術雑誌論文 / Journal Article(1) |
公開日 |
2020-10-30 |
タイトル |
|
|
タイトル |
Semantic diversity: Privacy considering distance between values of sensitive attribute |
|
言語 |
en |
言語 |
|
|
言語 |
eng |
キーワード |
|
|
言語 |
en |
|
主題 |
Computer security |
キーワード |
|
|
言語 |
en |
|
主題 |
Privacy preserving data publishing |
キーワード |
|
|
言語 |
en |
|
主題 |
Anonymity |
キーワード |
|
|
言語 |
en |
|
主題 |
l-diversity |
資源タイプ |
|
|
資源タイプ識別子 |
http://purl.org/coar/resource_type/c_6501 |
|
資源タイプ |
journal article |
著者 |
Oishi, Keiichiro
Sei, Yuichi
Tahara, Yasuyuki
Ohsuga, Akihiko
|
抄録 |
|
|
内容記述タイプ |
Abstract |
|
内容記述 |
A database that contains personal information and is collected by crowdsensing can be used for various purposes. Therefore, database holders may want to share their databases with other organizations. However, since a database contains information about individuals, database recipients must take privacy concerns into consideration. One of the mainstream privacy protection indicators, l-diversity, guarantees that the probability of identifying a sensitive attribute value of an individual in a database is less than 1/l. However, when there are several semantically similar values in the sensitive attribute, there is a possibility that actual diversity is not satisfied, even if anonymization is performed to satisfy l-diversity. For example, an attacker may know that candidates of Alice’s disease are a set of HIV-1(M), HIV-1(N), and HIV-2 if the anonymized database satisfies 3-diversity. In this case, the attacker can conclude that Alice has HIV, although the detailed type remains unknown. In this research, to solve how actual diversity cannot be taken into consideration with existing l-diversity, we proposed a novel privacy indicator, (l, d)-semantic diversity, and an algorithm that anonymizes a database to satisfy (l, d)-semantic diversity. We also proposed an analysis algorithm that is suitable for the proposed anonymizing algorithm because the output of the anonymizing algorithm is difficult to understand. Our proposed algorithms were experimentally evaluated using synthetic and real datasets. |
書誌情報 |
en : Computers & Security
巻 94,
p. 101823-10182,
発行日 2020-07
|
出版者 |
|
|
出版者 |
Elsevier |
ISSN |
|
|
収録物識別子タイプ |
ISSN |
|
収録物識別子 |
0167-4048 |
DOI |
|
|
関連タイプ |
isVersionOf |
|
|
識別子タイプ |
DOI |
|
|
関連識別子 |
10.1016/j.cose.2020.101823 |
権利 |
|
|
権利情報 |
© 2020 Elsevier Ltd. All rights reserved. |
関連サイト |
|
|
|
識別子タイプ |
DOI |
|
|
関連識別子 |
https://doi.org/10.1016/j.cose.2020.101823 |
著者版フラグ |
|
|
出版タイプ |
AM |
|
出版タイプResource |
http://purl.org/coar/version/c_ab4af688f83e57aa |