Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2015, Vol. 16 Issue (9): 720-731    DOI: 10.1631/FITEE.1400395
    
Towards a respondent-preferred ki-anonymity model
Kok-Seng Wong, Myung Ho Kim
1School of Computer Science and Engineering, Soongsil University, Seoul 06978, Korea; 2School of Software, Soongsil University, Seoul 06978, Korea
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      

Abstract  Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submitting their data if the published data was anonymous. We believe that this assumption is not realistic because the increase in privacy concerns causes some respondents to refuse participation or to submit inaccurate data to such agencies. If respondents submit inaccurate data, then the usefulness of the results from analysis of the collected data cannot be guaranteed. Furthermore, we note that the level of anonymity (i.e., k-anonymity) guaranteed by an agency cannot be verified by respondents since they generally do not have access to all of the data that is released. Therefore, we introduce the notion of ki-anonymity, where ki is the level of anonymity preferred by each respondent i. Instead of placing full trust in an agency, our solution increases respondent confidence by allowing each to decide the preferred level of protection. As such, our protocol ensures that respondents achieve their preferred ki-anonymity during data collection and guarantees that the collected records are genuine and useful for data analysis.

Key wordsAnonymous data collection      Respondent-preferred privacy protection      k-anonymity     
Received: 16 November 2014      Published: 06 September 2015
CLC:  TP309  
Cite this article:

Kok-Seng Wong, Myung Ho Kim. Towards a respondent-preferred ki-anonymity model. Front. Inform. Technol. Electron. Eng., 2015, 16(9): 720-731.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/FITEE.1400395     OR     http://www.zjujournals.com/xueshu/fitee/Y2015/V16/I9/720


面向优选应答的k-匿名模型

目的:数据采集的隐私保护问题近年来受到广泛关注。传统的数据采集过程中,采集机构假设在匿名发布数据的前提下,所有应答者对于提交各自数据的过程均是满意的。本文作者认为这一假设并不实际,因日益增长的隐私保护需求导致部分应答者拒绝或提交不准确的数据,从而将导致由这些数据得到的分析结果不可靠。因此,本文引入ki-匿名模型,由应答者选择自己偏好的匿名水平。
创新点:本文所提算法其背后主要思想是允许每个应答者学习自身记录的事件数目,即仅需获取自身约束条件的满意度得分。
方法:首先,生成唯一身份标识和约束条件。接着,检查约束条件的满意度情况。然后,计算满意度得分。最后,更新约束条件的满意度表格(图1)。
结论:引入ki-匿名模型的概念,允许应答者在提交数据前能够选择自己偏好的匿名保护水平。所提算法确保应答者在数据采集过程中实现其偏好的匿名保护水平,且所采集的数据真实并有效用于数据分析。

关键词: 匿名数据采集,  优选应答的隐私保护,  k-匿名 
[1] Ehsan Saeedi, Yinan Kong, Md. Selim Hossain. Side-channel attacks and learning-vector quantization[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(4): 511-518.
[2] Yu-jun Xiao, Wen-yuan Xu, Zhen-hua Jia, Zhuo-ran Ma, Dong-lian Qi. NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(4): 519-534.
[3] Gaurav Bansod, Narayan Pisharoty, Abhijit Patil. BORON: an ultra-lightweight and low power encryption design for pervasive computing[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(3): 332-345.
[4] Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu. Efficient hierarchical identity based encryption scheme in the standard model over lattices[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(8): 781-791.
[5] Jia Xie, Yu-pu Hu, Jun-tao Gao, Wen Gao. Efficient identity-based signature over NTRU lattice[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(2): 135-142.
[6] Kuo-Hui Yeh. A lightweight authentication scheme with user untraceability[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(4): 259-271.
[7] Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan. ImgFS: a transparent cryptography for stored images using a filesystem in userspace[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(1): 28-42.
[8] Shuang Tan, Yan Jia. NaEPASC: a novel and efficient public auditing scheme for cloud data[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(9): 794-804.
[9] Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan. Performance study of selective encryption in comparison to full encryption for still visual images[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(6): 435-444.
[10] Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou. Analysis and design of a smart card based authentication protocol[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(12): 909-917.
[11] Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(2): 85-97.
[12] Hong-yuan Chen, Yue-sheng Zhu. A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(8): 573-584.
[13] Baiying Lei, Ing Yann Soon. A multipurpose audio watermarking algorithm with synchronization and encryption[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(1): 11-19.
[14] Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun. CCA2 secure biometric identity based encryption with constant-size ciphertext[J]. Front. Inform. Technol. Electron. Eng., 2011, 12(10): 819-827.
[15] Zoe Lin Jiang, Jun-bin Fang, Lucas Chi Kwong Hui, Siu Ming Yiu, Kam Pui Chow, Meng-meng Sheng. k-Dimensional hashing scheme for hard disk integrity verification in computer forensics[J]. Front. Inform. Technol. Electron. Eng., 2011, 12(10): 809-818.