WEKO3
アイテム
{"_buckets": {"deposit": "d14fe0d1-a4c0-41c9-86d4-d3ef27b948db"}, "_deposit": {"created_by": 13, "id": "9664", "owners": [13], "pid": {"revision_id": 0, "type": "depid", "value": "9664"}, "status": "published"}, "_oai": {"id": "oai:uec.repo.nii.ac.jp:00009664", "sets": ["6"]}, "author_link": ["26042", "26043", "26044", "26045"], "control_number": "9664", "item_10001_biblio_info_7": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2020-07", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "10182", "bibliographicPageStart": "101823", "bibliographicVolumeNumber": "94", "bibliographic_titles": [{"bibliographic_title": "Computers \u0026 Security", "bibliographic_titleLang": "en"}]}]}, "item_10001_description_5": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "A database that contains personal information and is collected by crowdsensing can be used for various purposes. Therefore, database holders may want to share their databases with other organizations. However, since a database contains information about individuals, database recipients must take privacy concerns into consideration. One of the mainstream privacy protection indicators, l-diversity, guarantees that the probability of identifying a sensitive attribute value of an individual in a database is less than 1/l. However, when there are several semantically similar values in the sensitive attribute, there is a possibility that actual diversity is not satisfied, even if anonymization is performed to satisfy l-diversity. For example, an attacker may know that candidates of Alice’s disease are a set of HIV-1(M), HIV-1(N), and HIV-2 if the anonymized database satisfies 3-diversity. In this case, the attacker can conclude that Alice has HIV, although the detailed type remains unknown. In this research, to solve how actual diversity cannot be taken into consideration with existing l-diversity, we proposed a novel privacy indicator, (l, d)-semantic diversity, and an algorithm that anonymizes a database to satisfy (l, d)-semantic diversity. We also proposed an analysis algorithm that is suitable for the proposed anonymizing algorithm because the output of the anonymizing algorithm is difficult to understand. Our proposed algorithms were experimentally evaluated using synthetic and real datasets.", "subitem_description_type": "Abstract"}]}, "item_10001_publisher_8": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "Elsevier"}]}, "item_10001_relation_14": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1016/j.cose.2020.101823", "subitem_relation_type_select": "DOI"}}]}, "item_10001_relation_17": {"attribute_name": "関連サイト", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "https://doi.org/10.1016/j.cose.2020.101823", "subitem_relation_type_select": "DOI"}}]}, "item_10001_rights_15": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2020 Elsevier Ltd. All rights reserved."}]}, "item_10001_source_id_9": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0167-4048", "subitem_source_identifier_type": "ISSN"}]}, "item_10001_version_type_20": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Oishi, Keiichiro", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "26042", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Sei, Yuichi", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "26043", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Tahara, Yasuyuki", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "26044", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Ohsuga, Akihiko", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "26045", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2022-07-01"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "Computers \u0026 Security 94_101823.pdf", "filesize": [{"value": "14.4 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 14400000.0, "url": {"label": "Computers \u0026 Security 94_101823", "url": "https://uec.repo.nii.ac.jp/record/9664/files/Computers \u0026 Security 94_101823.pdf"}, "version_id": "dda56b6a-036a-4abf-aae3-7630f6e1bc38"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Computer security", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Privacy preserving data publishing", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Anonymity", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "l-diversity", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Semantic diversity: Privacy considering distance between values of sensitive attribute", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Semantic diversity: Privacy considering distance between values of sensitive attribute", "subitem_title_language": "en"}]}, "item_type_id": "10001", "owner": "13", "path": ["6"], "permalink_uri": "https://uec.repo.nii.ac.jp/records/9664", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2020-10-30"}, "publish_date": "2020-10-30", "publish_status": "0", "recid": "9664", "relation": {}, "relation_version_is_last": true, "title": ["Semantic diversity: Privacy considering distance between values of sensitive attribute"], "weko_shared_id": -1}
Semantic diversity: Privacy considering distance between values of sensitive attribute
https://uec.repo.nii.ac.jp/records/9664
https://uec.repo.nii.ac.jp/records/9664900f1795-d224-48c4-90ef-02111919be77
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2020-10-30 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | Semantic diversity: Privacy considering distance between values of sensitive attribute | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Computer security | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Privacy preserving data publishing | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Anonymity | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | l-diversity | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | journal article | |||||
著者 |
Oishi, Keiichiro
× Oishi, Keiichiro× Sei, Yuichi× Tahara, Yasuyuki× Ohsuga, Akihiko |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | A database that contains personal information and is collected by crowdsensing can be used for various purposes. Therefore, database holders may want to share their databases with other organizations. However, since a database contains information about individuals, database recipients must take privacy concerns into consideration. One of the mainstream privacy protection indicators, l-diversity, guarantees that the probability of identifying a sensitive attribute value of an individual in a database is less than 1/l. However, when there are several semantically similar values in the sensitive attribute, there is a possibility that actual diversity is not satisfied, even if anonymization is performed to satisfy l-diversity. For example, an attacker may know that candidates of Alice’s disease are a set of HIV-1(M), HIV-1(N), and HIV-2 if the anonymized database satisfies 3-diversity. In this case, the attacker can conclude that Alice has HIV, although the detailed type remains unknown. In this research, to solve how actual diversity cannot be taken into consideration with existing l-diversity, we proposed a novel privacy indicator, (l, d)-semantic diversity, and an algorithm that anonymizes a database to satisfy (l, d)-semantic diversity. We also proposed an analysis algorithm that is suitable for the proposed anonymizing algorithm because the output of the anonymizing algorithm is difficult to understand. Our proposed algorithms were experimentally evaluated using synthetic and real datasets. | |||||
書誌情報 |
en : Computers & Security 巻 94, p. 101823-10182, 発行日 2020-07 |
|||||
出版者 | ||||||
出版者 | Elsevier | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 0167-4048 | |||||
DOI | ||||||
関連タイプ | isVersionOf | |||||
識別子タイプ | DOI | |||||
関連識別子 | 10.1016/j.cose.2020.101823 | |||||
権利 | ||||||
権利情報 | © 2020 Elsevier Ltd. All rights reserved. | |||||
関連サイト | ||||||
識別子タイプ | DOI | |||||
関連識別子 | https://doi.org/10.1016/j.cose.2020.101823 | |||||
著者版フラグ | ||||||
出版タイプ | AM | |||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa |