Abstract
Protecting data privacy is a vital problem in micro data distribution when disclosing individual’s information. k-Anonymization is a popular approach in protecting individuals from being identified when linked to the external data like voters list. A view of k-anonymity is grouping the data values with constraint of minimum number of data points in every group. In this paper we propose Minimum Spanning Tree (MST) approach to achieve k-anonymity. We define hierarchical distance between two tuples as a metric for constructing the edges of MST. Our approach yields an efficient way to achieve k-anonymity and it balances both privacy protection and data utility.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Sweeney, L.: K-anonymity: a model for protecting privacy. International Journal on Uncertainty 10(5), 557–570 (2002)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and Suppression. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571–588 (2002)
Gagan, A., Thomas, F., Krishnam, K., Zhu, A.: Achieving Anonymity via Clustering. In: Proc. of PODS 2006 (2006)
Li, J., Wong, R.C.-W., Fu, A.W.-C., Pei, J.: Achieving k- Anonymity by clustering in Attribute Hierarchical Structures. In: 8th International Conference on Data Warehousing and Knowledge Discovery, Krakow, Poland, pp. 405–416 (2006)
Zhu, H., Ye, X.: Achieving k-Anonymity Via a Density-Based Clustering Method. In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds.) APWeb/WAIM 2007. LNCS, vol. 4505, pp. 745–752. Springer, Heidelberg (2007)
Kruskal, J.: On the shortest spanning sub tree and the travelling sales problem. In: Proceedings of the American Mathematical Society, pp. 48–50 (1956)
Nesetril, J., Milkova, E., Nesetrilova, H.: On minimum spanning tree problem. In: DMATH, p. 233 (2001)
Prim, R.: Shortest connection networks and some generalization. Bell Systems Technical Journal, 1389–1401 (1957)
Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proc. of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, Texas, pp. 439–450 (2000)
Adusumalli, S.K., Kumari, V.V.: Attribute Based Anonymity for Preserving Privacy. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part IV. Communications in Computer and Information Science, vol. 193, pp. 572–579. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer India Pvt. Ltd.
About this paper
Cite this paper
Venkata Ramana, K., Valli Kumari, V., Raju, K.V.S.V.N. (2012). Minimum Spanning Tree Based k-Anonymity. In: Deep, K., Nagar, A., Pant, M., Bansal, J. (eds) Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011. Advances in Intelligent and Soft Computing, vol 130. Springer, India. https://doi.org/10.1007/978-81-322-0487-9_39
Download citation
DOI: https://doi.org/10.1007/978-81-322-0487-9_39
Published:
Publisher Name: Springer, India
Print ISBN: 978-81-322-0486-2
Online ISBN: 978-81-322-0487-9
eBook Packages: EngineeringEngineering (R0)