Personalized Privacy Protection Based on Liversity against Connection Fingerprint Attack

With the emergence and development of data mining and data publishing technology, how to protect private data and prevent sensitive information leakage has become a major challenge. According to the existing privacy protection of social networks, attackers can re-identify private users according to the connection fingerprint information of some known public users in the network, and propose two solutions based on k-anonymity clustering method. However, most anonymization methods ignore the personalized privacy protection preferences of different private users, and k-anonymity clustering model has some subtle but serious privacy problems. In this paper, the original datasets are clustered, according to the needs of different users for personalized privacy protection, to form equivalence classes model, based on the l-diversity, which improved the k-anonymity algorithm for n-range connection fingerprint attacks. At the same time, it also improves the k-anonymity algorithm for n-range fingerprint attacks, and designs the LCFC and LCNC algorithms. Finally, experiments prove that the solution proposed in this paper has very effective running time and good stability.

[1]  Hong Shen,et al.  Anonymizing Graphs Against Weight-Based Attacks , 2010, 2010 IEEE International Conference on Data Mining Workshops.

[2]  Donald F. Towsley,et al.  Resisting structural re-identification in anonymized social networks , 2008, The VLDB Journal.

[3]  Divesh Srivastava,et al.  Prediction Promotes Privacy in Dynamic Social Networks , 2010, WOSN.

[4]  Ting Yu,et al.  Anonymizing bipartite graph data using safe groupings , 2008, Proc. VLDB Endow..

[5]  Ai-qiang Gao,et al.  Privacy preservation for attribute order sensitive workload in medical data publishing , 2009, 2009 IEEE International Symposium on IT in Medicine & Education.

[6]  Rongxing Lu,et al.  PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system , 2018, Future Gener. Comput. Syst..

[7]  Yanghua Xiao,et al.  k-symmetry model for identity anonymization in social networks , 2010, EDBT '10.

[8]  Alina Campan,et al.  A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .

[9]  Siddharth Srivastava,et al.  Anonymizing Social Networks , 2007 .

[10]  Donald F. Towsley,et al.  Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.

[11]  Liu Yong-hong The Research of Personalized-Granular k-anonymity , 2010 .

[12]  Sheikh Iqbal Ahamed,et al.  A privacy preserving framework for RFID based healthcare systems , 2017, Future Gener. Comput. Syst..

[13]  Jon M. Kleinberg,et al.  Wherefore art thou R3579X? , 2011, Commun. ACM.