KIDS:K-anonymization data stream base on sliding window

In a wide range of fields, data arrive in the form of high speed and huge data streams, and accompanying risks of disclosure of privacy. Most of previous studies about privacy preserving, such as k-anonymity methods, are excellent and effective, however, focus on static data sets. In this paper, we study a novel framework KIDS (K-anonymIzation Data Stream base on sliding window) to solve this problem by continuously k-anonymity on the sliding window. KIDS protects privacy of data stream well and considers the distribute density of data in data stream, thereby improve usefulness of data largely. Our theoretical analysis and experimental results show that we can receive more accurate data mining results by KIDS with high efficiency.

[1]  Jian Xu,et al.  Utility-based anonymization for privacy preservation with less information loss , 2006, SKDD.

[2]  Pierangela Samarati,et al.  Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.

[3]  Beng Chin Ooi,et al.  Anonymizing Streaming Data for Privacy Protection , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[4]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[5]  Catherine Blake,et al.  UCI Repository of machine learning databases , 1998 .

[6]  David J. DeWitt,et al.  Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.

[7]  Vijay S. Iyengar,et al.  Transforming data to satisfy privacy constraints , 2002, KDD.

[8]  Bin Jiang,et al.  Continuous privacy preserving publishing of data streams , 2009, EDBT '09.

[9]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[10]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[11]  Philip S. Yu,et al.  A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.

[12]  Shonali Krishnaswamy,et al.  Mining data streams: a review , 2005, SGMD.

[13]  Kian-Lee Tan,et al.  CASTLE: A delay-constrained scheme for ks-anonymizing data streams , 2008, 2008 IEEE 24th International Conference on Data Engineering.