The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things

In order to enhance the enthusiasm of the data provider in the process of data interaction and improve the adequacy of data interaction, we put forward the concept of the ego of data and then analyzed the characteristics of the ego of data in the Internet of Things (IOT) in this paper. We implement two steps of data clustering for the Internet of things; the first step is the spatial location of adjacent fuzzy clustering, and the second step is the sampling time fuzzy clustering. Equivalent classes can be obtained through the two steps. In this way we can make the data with layout characteristics to be classified into different equivalent classes, so that the specific location information of the data can be obscured, the layout characteristics of tags are eliminated, and ultimately anonymization protection would be achieved. The experimental results show that the proposed algorithm can greatly improve the efficiency of protection of the data in the interaction with others in the incompletely open manner, without reducing the quality of anonymization and enhancing the information loss. The anonymization data set generated by this method has better data availability, and this algorithm can effectively improve the security of data exchange.

[1]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  Raymond Chi-Wing Wong,et al.  (α, k)-anonymous data publishing , 2009, Journal of Intelligent Information Systems.

[3]  Bhushan Trivedi,et al.  Hybrid intelligent access control framework to protect data privacy and theft , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[4]  Hamada H. Ghenniwa,et al.  Ambient Systems , Networks and Technologies ( ANT 2015 ) Privacy in Internet of Things : A Model and Protection Framework , 2015 .

[5]  S. Landau Control use of data to protect privacy , 2015, Science.

[6]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[7]  陈永武 α , 1995 .

[8]  Ashok V. Sutagundar,et al.  Data Management in Internet of Things , 2017 .

[9]  Albert Levi,et al.  k-anonymity based framework for privacy preserving data collection in wireless sensor networks , 2010, Turkish Journal of Electrical Engineering and Computer Sciences.

[10]  Wei Jiang,et al.  Property-Based Anonymous Attestation in Trusted Cloud Computing , 2014, J. Electr. Comput. Eng..

[11]  Sead Muftic,et al.  Business Information Exchange System with Security, Privacy, and Anonymity , 2016, J. Electr. Comput. Eng..

[12]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[13]  Samir Khuller,et al.  Achieving anonymity via clustering , 2006, PODS '06.

[14]  Seung-Soo Shin,et al.  An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services , 2015, Wireless Personal Communications.

[15]  Xavier Hesselbach,et al.  Innovative Techniques for Power Consumption Saving in Telecommunication Networks , 2014, J. Electr. Comput. Eng..