Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions

Published: 17 April 2024 Publication History
  • Get Citation Alerts
  • Abstract

    K-anonymity is a widely used privacy-preserving technique which defends against linking attacks by suppression and generalization. The existing k-anonymity algorithms prevent attackers from illegally obtaining private information by constraining at least k records in an equivalence group. However, this unified anonymity method ignores individual differences and leads to a large amount of information loss. To this end, we introduce sequential three-way decisions into k-anonymity, using a dynamic k-value sequence instead of the fixed k-value to achieve personalized k-anonymity. Specifically, we first construct a hierarchical decision table for k-anonymity by attribute generalization trees and sensitive decision values provided with users. Then, we propose a multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions, where we anonymize the partitioning granular data with a dynamic k-value sequence, respectively. Furthermore, we present three practical algorithms to implement the proposed model and discuss the differences between them. Finally, the experimental results demonstrate that the proposed model not only provides a more flexible anonymization method to achieve personalized anonymity, but greatly reduces the information loss. This study provides a complete framework for multi-level privacy protection and enriches the application of sequential three-way decisions.

    Highlights

    A hierarchical decision table for k-anonymity by sensitive decision is constructed.
    Multi-level personalized k-anonymity by sequential three-way decisions is proposed.
    Three practical algorithms of the proposed model and the differences are described.

    References

    [1]
    Cao N., Wang C., Li M., Ren K., Lou W., Privacy-preserving multi-keyword ranked search over encrypted cloud data, Ieee Transactions on Parallel and Distributed Systems 25 (1) (2013) 222–233.
    [2]
    Denham B., Pears R., Naeem M.A., Enhancing random projection with independent and cumulative additive noise for privacy-preserving data stream mining, Expert Systems with Applications 152 (2020).
    [3]
    Fang Y., Gao C., Yao Y., Granularity-driven sequential three-way decisions: A cost-sensitive approach to classification, Information Sciences 507 (2020) 644–664.
    [4]
    Gao S., Ma J., Sun C., Li X., Balancing trajectory privacy and data utility using a personalized anonymization model, Journal of Network and Computer Applications 38 (2014) 125–134.
    [5]
    Gedik B., Liu L., Protecting location privacy with personalized k-anonymity: Architecture and algorithms, Ieee Transactions on Mobile Computing 7 (1) (2008) 1–18.
    [6]
    Gong Q., Luo J., Yang M., Ni W., Li X.-B., Anonymizing 1:M microdata with high utility, Knowledge-Based Systems 115 (2017) 15–26.
    [7]
    Guo J., Yang M., Wan B., A practical privacy-preserving publishing mechanism based on personalized k-anonymity and temporal differential privacy for wearable IoT applications, Symmetry-Basel 13 (6) (2021) 1043.
    [8]
    He D., Zeadally S., Xu B., Huang X., An efficient identity-based conditional privacy-preserving authentication scheme for vehicular Ad Hoc networks, Ieee Transactions on Information Forensics and Security 10 (12) (2015) 2681–2691.
    [9]
    Hu B.Q., Three-way decisions space and three-way decisions, Information Sciences 281 (2014) 21–52.
    [10]
    Kacha L., Zitouni A., Djoudi M., KAB: A new k-anonymity approach based on black hole algorithm, Journal of King Saud University-Computer and Information Sciences 34 (7) (2022) 4075–4088.
    [11]
    Li N., Li T., Venkatasubramanian S., T-closeness: Privacy beyond k-anonymity and l-diversity, in: 2007 IEEE 23rd international conference on data engineering, IEEE, 2006, pp. 106–115.
    [12]
    Liang D., Pedrycz W., Liu D., Hu P., Three-way decisions based on decision-theoretic rough sets under linguistic assessment with the aid of group decision making, Applied Soft Computing 29 (2015) 256–269.
    [13]
    Liang Y., Samavi R., Optimization-based k-anonymity algorithms, Computers & Security 93 (2020).
    [14]
    Liang D., Xu Z., Liu D., Wu Y., Method for three-way decisions using ideal TOPSIS solutions at pythagorean fuzzy information, Information Sciences 435 (2018) 282–295.
    [15]
    Lin J.-L., Wei M.-C., Genetic algorithm-based clustering approach for k-anonymization, Expert Systems with Applications 36 (6) (2009) 9784–9792.
    [16]
    Liu X., Xie Q., Wang L., Personalized extended (α, k)-anonymity model for privacy-preserving data publishing, Concurrency and Computation-Practice & Experience 29 (6) (2016) 3886.
    [17]
    Machanavajjhala A., Kifer D., Gehrke J., Venkitasubramaniam M., L-diversity: Privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data (TKDD) 1 (1) (2007) 3.
    [18]
    Mehta B.B., Rao U.P., Improved l-diversity: Scalable anonymization approach for privacy preserving big data publishing, Journal of King Saud University-Computer and Information Sciences 34 (4) (2022) 1423–1430.
    [19]
    Mortazavi R., Erfani S., GRAM: An efficient (k, l) graph anonymization method, Expert Systems with Applications 153 (2020).
    [20]
    Qian J., Liu C., Miao D., Yue X., Sequential three-way decisions via multi-granularity, Information Sciences 507 (2020) 606–629.
    [21]
    Qian J., Tang D., Yu Y., Yang X., Gao S., Hierarchical sequential three-way decision model, International Journal of Approximate Reasoning 140 (2022) 156–172.
    [22]
    Qian W., Zhou Y., Qian J., Wang Y., Cost-sensitive sequential three-way decision for information system with fuzzy decision, International Journal of Approximate Reasoning 149 (2022) 85–103.
    [23]
    Ren X., Jiang D., A personalized (α, β, l, k)-anonymity model of social network for protecting privacy, Wireless Communications & Mobile Computing 2022 (2022) 11.
    [24]
    Song F., Ma T., Tian Y., Al-Rodhaan M., A new method of privacy protection: Random k-anonymous, Ieee Access 7 (2019) 75434–75445.
    [25]
    Sun X., Sun L., Wang H., Extended k-anonymity models against sensitive attribute disclosure, Computer Communications 34 (4) (2011) 526–535.
    [26]
    Sweeney L., Achieving k-anonymity privacy protection using generalization and suppression, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10 (5) (2002) 571–588.
    [27]
    Sweeney L., K-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10 (05) (2002) 557–570.
    [28]
    Truta T.M., Vinay B., Privacy protection: p-sensitive k-anonymity property, in: 22nd International conference on data engineering workshops, IEEE, 2006, p. 94.
    [29]
    Wang Z., Xu Y., Yan Y., Zhang Y., Rao Z., Ouyang X., Privacy-preserving indoor localization based on inner product encryption in a cloud environment, Knowledge-Based Systems 239 (2022).
    [30]
    Wong, R. C.-W., Li, J., Fu, A. W.-C., & Wang, K. (2006). (α, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 754–759).
    [31]
    Xiao, X., & Tao, Y. (2006). Personalized privacy preservation. In Proceedings of the 2006 ACM SIGMOD international conference on management of data (pp. 229–240).
    [32]
    Xiong J., Ma R., Chen L., Tian Y., Li Q., Liu X., et al., A personalized privacy protection framework for mobile crowdsensing in IIoT, Ieee Transactions on Industrial Informatics 16 (6) (2019) 4231–4241.
    [33]
    Xu Y., Zheng Z., Liu X., Yao A., Li X., Three-way decisions based service migration strategy in mobile edge computing, Information Sciences 609 (2022) 533–547.
    [34]
    Yao Y., Three-way decisions with probabilistic rough sets, Information Sciences 180 (3) (2010) 341–353.
    [35]
    Yao Y., The superiority of three-way decisions in probabilistic rough set models, Information Sciences 181 (6) (2011) 1080–1096.
    [36]
    Yao Y., Granular computing and sequential three-way decisions, in: Rough sets and knowledge technology: 8th International conference, RSKT 2013, Halifax, NS, Canada, October 11-14, 2013, Proceedings 8, Springer, 2013, pp. 16–27.
    [37]
    Yao Y., Three-way decision and granular computing, International Journal of Approximate Reasoning 103 (2018) 107–123.
    [38]
    Yao Y., Three-way granular computing, rough sets, and formal concept analysis, International Journal of Approximate Reasoning 116 (2020) 106–125.
    [39]
    Yao Y., Deng X., Sequential three-way decisions with probabilistic rough sets, in: Proceedings of the 10th IEEE international conference on cognitive informatics and cognitive computing, IEEE, 2011, pp. 120–125.
    [40]
    Yao Y., Wong S., A decision theoretic framework for approximating concepts, International Journal of Man-Machine Studies 37 (6) (1992) 793–809.
    [41]
    Yao Y., Wong S., Lingras P., A decision-theoretic rough set model, Methodologies for Intelligent Systems 5 (1990) 17–24.
    [42]
    Ye M., Wu X., Hu X., Hu D., Anonymizing classification data using rough set theory, Knowledge-Based Systems 43 (2013) 82–94.
    [43]
    Yu H., Zhang C., Wang G., A tree-based incremental overlapping clustering method using the three-way decision theory, Knowledge-Based Systems 91 (2016) 189–203.
    [44]
    Zhan J., Ye J., Ding W., Liu P., A novel three-way decision model based on utility theory in incomplete fuzzy decision systems, Ieee Transactions on Fuzzy Systems 30 (7) (2022) 2210–2226.
    [45]
    Zhang Q., Pang G., Wang G., A novel sequential three-way decisions model based on penalty function, Knowledge-Based Systems 192 (2020).

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Expert Systems with Applications: An International Journal
    Expert Systems with Applications: An International Journal  Volume 239, Issue C
    Apr 2024
    1593 pages

    Publisher

    Pergamon Press, Inc.

    United States

    Publication History

    Published: 17 April 2024

    Author Tags

    1. Decision-theoretic rough set
    2. Sequential three-way decisions
    3. K-anonymity
    4. Personalized anonymity
    5. Privacy preservation

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media