{"title":"A method of Enhanced t - Closeness for privacy protection","authors":"Song Yang, Liu Lijie, Zhang Jianpei, Yang Jing","doi":"10.1109/MIC.2013.6758241","DOIUrl":null,"url":null,"abstract":"For t-Closeness which did not give a specific algorithm, and the semantic privacy can't custom question, on the basis of model of t-Closeness and enhanced k-anonymity technology, Enhanced t-closeness privacy protection method is proposed in this paper, gives a semantic privacy degree measure and specific implementation of the algorithm. This article gives two specific algorithms: a top-down approach and a method based on the genetic classification. Using this method can enhance the ability of resistance similar to sexual assault, effectively prevent privacy leaks, and ensure the availability of the data quality.","PeriodicalId":404630,"journal":{"name":"Proceedings of 2013 2nd International Conference on Measurement, Information and Control","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2013 2nd International Conference on Measurement, Information and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MIC.2013.6758241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
For t-Closeness which did not give a specific algorithm, and the semantic privacy can't custom question, on the basis of model of t-Closeness and enhanced k-anonymity technology, Enhanced t-closeness privacy protection method is proposed in this paper, gives a semantic privacy degree measure and specific implementation of the algorithm. This article gives two specific algorithms: a top-down approach and a method based on the genetic classification. Using this method can enhance the ability of resistance similar to sexual assault, effectively prevent privacy leaks, and ensure the availability of the data quality.