About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
ChinaCom2008-Network and Information Security Symposium

Research Article

An Improved l-Diversity Model for Numerical Sensitive Attributes

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685178,
        author={Jianmin Han and Huiqun Yu and Juan Yu},
        title={An Improved l-Diversity Model for Numerical Sensitive Attributes},
        proceedings={ChinaCom2008-Network and Information Security Symposium},
        publisher={IEEE},
        proceedings_a={CHINACOM2008-NIS},
        year={2008},
        month={11},
        keywords={k-anonymity; homogeneity attack; background knowledge attack},
        doi={10.1109/CHINACOM.2008.4685178}
    }
    
  • Jianmin Han
    Huiqun Yu
    Juan Yu
    Year: 2008
    An Improved l-Diversity Model for Numerical Sensitive Attributes
    CHINACOM2008-NIS
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685178
Jianmin Han1,*, Huiqun Yu1,*, Juan Yu2,*
  • 1: Dept of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
  • 2: Mathematics, Physics and Information Engineering College of Zhejiang Normal University, Jinhua 321004, China
*Contact email: hanjm@zjnu.cn, yhq@ecust.edu.cn, ysy924@gmail.com

Abstract

L-diversity model is an effective model to thwart homogeneity attack and background knowledge attack for microdata, but it has some defects on handling numerical sensitive attributes. The paper proposes an improved l-diversity model to address the problem. The model divides numerical sensitive values into several levels, and realizes sensitive attribute l-diversity based on these levels. Distinct diversity and entropy diversity are defined. Based on these definitions, an l-incognito algorithm is designed to implement the improved model. Experimental results show that the improved l-diversity model can protect numerical sensitive attributes effectively, and the anonymity tables generated by the l-incognito algorithm have high sensitive attributes diversity, so can resist homogeneity attack and partial background knowledge attack effectively.

Keywords
k-anonymity; homogeneity attack; background knowledge attack
Published
2008-11-21
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.1109/CHINACOM.2008.4685178
Copyright © 2008–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL