메뉴 건너뛰기




Volumn 70, Issue 10, 2011, Pages 892-921

An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers

Author keywords

Anonymous microaggregation; Distortion optimized quantizer design; k Anonymity; k Means method; Lloyd algorithm; Location based services; MDAV; Privacy

Indexed keywords

K-ANONYMITY; K-MEANS METHOD; LLOYD ALGORITHM; LOCATION-BASED SERVICES; MDAV; MICROAGGREGATION; QUANTIZER DESIGN;

EID: 80051799598     PISSN: 0169023X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.datak.2011.06.005     Document Type: Article
Times cited : (23)

References (87)
  • 2
    • 0020102027 scopus 로고
    • Least squares quantization in PCM
    • S.P. Lloyd Least squares quantization in PCM IEEE Trans. Inform. Theory IT-28 Mar. 1982 129 137
    • (1982) IEEE Trans. Inform. Theory , vol.IT-28 , pp. 129-137
    • Lloyd, S.P.1
  • 3
    • 84937350296 scopus 로고
    • Quantizing for minimum distortion
    • J. Max Quantizing for minimum distortion IEEE Trans. Inform. Theory 6 1 Mar. 1960 7 12
    • (1960) IEEE Trans. Inform. Theory , vol.6 , Issue.1 , pp. 7-12
    • Max, J.1
  • 4
    • 0000169232 scopus 로고
    • An algorithm for least-squares estimation of nonlinear parameters
    • D. Marquardt An algorithm for least-squares estimation of nonlinear parameters SIAM J. Appl. Math. (SIAP) 11 1963 431 441
    • (1963) SIAM J. Appl. Math. (SIAP) , vol.11 , pp. 431-441
    • Marquardt, D.1
  • 5
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • P. Samarati, and L. Sweeney Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression SRI Int., Tech. Rep. 1998
    • (1998) SRI Int., Tech. Rep.
    • Samarati, P.1    Sweeney, L.2
  • 6
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • DOI 10.1109/69.971193
    • P. Samarati Protecting respondents' identities in microdata release IEEE Trans. Knowl. Data Eng. 13 6 2001 1010 1027 (Pubitemid 34035590)
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 10
    • 26944448516 scopus 로고    scopus 로고
    • Ordinal, continuous and heterogeneous k-anonymity through microaggregation
    • DOI 10.1007/s10618-005-0007-5
    • J. Domingo-Ferrer, and V. Torra Ordinal, continuous and heterogenerous k-anonymity through microaggregation Data Min., Knowl. Disc. 11 2 2005 195 212 (Pubitemid 41476765)
    • (2005) Data Mining and Knowledge Discovery , vol.11 , Issue.2 , pp. 195-212
    • Domingo-Ferrer, J.1    Torra, V.2
  • 11
    • 37649020602 scopus 로고    scopus 로고
    • A polynomial-time approximation to optimal multivariate microaggregation
    • J. Domingo-Ferrer, F. Sebé, and A. Solanas A polynomial-time approximation to optimal multivariate microaggregation Elsevier Comput., Math. with Appl. 55 4 Feb. 2008 714 732
    • (2008) Elsevier Comput., Math. with Appl. , vol.55 , Issue.4 , pp. 714-732
    • Domingo-Ferrer, J.1    Sebé, F.2    Solanas, A.3
  • 12
    • 0035693941 scopus 로고    scopus 로고
    • On the complexity of optimal microaggregation for statistical disclosure control
    • A. Oganian, and J. Domingo-Ferrer On the complexity of optimal microaggregation for statistical disclosure control UNECE Stat. J. 18 4 Apr. 2001 345 354
    • (2001) UNECE Stat. J. , vol.18 , Issue.4 , pp. 345-354
    • Oganian, A.1    Domingo-Ferrer, J.2
  • 15
    • 68949164027 scopus 로고    scopus 로고
    • Statistical disclosure control for microdata using the R-package sdcMicro
    • [Online]. Available
    • M. Templ Statistical disclosure control for microdata using the R-package sdcMicro Trans. Data Privacy 1 2 2008 67 85 http://cran.r-project.org/web/ packages/sdcMicro [Online]. Available
    • (2008) Trans. Data Privacy , vol.1 , Issue.2 , pp. 67-85
    • Templ, M.1
  • 16
    • 22944452807 scopus 로고    scopus 로고
    • Minimum spanning tree partitioning algorithm for microaggregation
    • DOI 10.1109/TKDE.2005.112
    • M. Laszlo, and S. Mukherjee Minimum spanning tree partitioning algorithm for microaggregation IEEE Trans. Knowl. Data Eng. 17 7 Jul. 2005 902 911 (Pubitemid 41049864)
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.7 , pp. 902-911
    • Laszlo, M.1    Mukherjee, S.2
  • 18
    • 34548668710 scopus 로고    scopus 로고
    • TFRP: An efficient microaggregation algorithm for statistical disclosure control
    • C. Chin-chen, L. Yu-chiang, and H. Wen-huang TFRP: an efficient microaggregation algorithm for statistical disclosure control Elsevier J. Syst., Softw. 80 11 Nov. 2007 1866 1878
    • (2007) Elsevier J. Syst., Softw. , vol.80 , Issue.11 , pp. 1866-1878
    • Chin-Chen, C.1    Yu-Chiang, L.2    Wen-Huang, H.3
  • 19
    • 54349128838 scopus 로고    scopus 로고
    • On the disclosure risk of multivariate microaggregation
    • J. Nin, J. Herranz, and V. Torra On the disclosure risk of multivariate microaggregation Elsevier Data, Knowl. Eng. 67 3 2008 399 412
    • (2008) Elsevier Data, Knowl. Eng. , vol.67 , Issue.3 , pp. 399-412
    • Nin, J.1    Herranz, J.2    Torra, V.3
  • 21
    • 72849133477 scopus 로고    scopus 로고
    • Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
    • X. Sun, H. Wang, J. Li, and T.M. Truta Enhanced p-sensitive k-anonymity models for privacy preserving data publishing Trans. Data Privacy 1 2 2008 53 66
    • (2008) Trans. Data Privacy , vol.1 , Issue.2 , pp. 53-66
    • Sun, X.1    Wang, H.2    Li, J.3    Truta, T.M.4
  • 26
    • 77956995886 scopus 로고    scopus 로고
    • From t-closeness-like privacy to postrandomization via information theory
    • [Online]. Available
    • D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer From t-closeness-like privacy to postrandomization via information theory IEEE Trans. Knowl. Data Eng. 22 11 Nov. 2010 1623 1636 http://doi.ieeecomputersociety.org/ 10.1109/TKDE.2009.190 [Online]. Available
    • (2010) IEEE Trans. Knowl. Data Eng. , vol.22 , Issue.11 , pp. 1623-1636
    • Rebollo-Monedero, D.1    Forné, J.2    Domingo-Ferrer, J.3
  • 28
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E. Shannon Communication theory of secrecy systems Bell Syst., Tech. J. 1949
    • (1949) Bell Syst., Tech. J.
    • Shannon, C.E.1
  • 29
    • 0003214704 scopus 로고
    • Coding theorems for a discrete source with a fidelity criterion
    • Part 4
    • C.E. Shannon Coding theorems for a discrete source with a fidelity criterion IRE Nat. Conv. Rec 7 1959 142 163 Part 4
    • (1959) IRE Nat. Conv. Rec , vol.7 , pp. 142-163
    • Shannon, C.E.1
  • 31
    • 84894177799 scopus 로고    scopus 로고
    • How do we measure privacy?
    • D. Rebollo-Monedero, and J. Forné How do we measure privacy? Upgrade J. XI 1 Feb. 2010 53 58
    • (2010) Upgrade J. , vol.XI , Issue.1 , pp. 53-58
    • Rebollo-Monedero, D.1    Forné, J.2
  • 32
    • 77955802941 scopus 로고    scopus 로고
    • Optimal query forgery for private information retrieval
    • D. Rebollo-Monedero, and J. Forné Optimal query forgery for private information retrieval IEEE Trans. Inform. Theory 56 9 2010 4631 4642
    • (2010) IEEE Trans. Inform. Theory , vol.56 , Issue.9 , pp. 4631-4642
    • Rebollo-Monedero, D.1    Forné, J.2
  • 34
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • DOI 10.1145/4372.4373
    • D. Chaum Security without identification: transaction systems to make big brother obsolete Commun. ACM 28 10 Oct. 1985 1030 1044 (Pubitemid 15587967)
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum David1
  • 35
    • 33644989680 scopus 로고    scopus 로고
    • Specification of a framework for the anonymous use of privileges
    • V. Benjumea, J. López, and J.M.T. Linero Specification of a framework for the anonymous use of privileges Elsevier Telemat., Informat. 23 3 Aug. 2006 179 195
    • (2006) Elsevier Telemat., Informat. , vol.23 , Issue.3 , pp. 179-195
    • Benjumea, V.1    López, J.2    Linero, J.M.T.3
  • 37
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • ACM San Francisco, CA
    • M. Gruteser, and D. Grunwald Anonymous usage of location-based services through spatial and temporal cloaking Proc. ACM Int. Conf. Mob. Syst., Appl., Serv. (MobiSys) May 2003 ACM San Francisco, CA 31 42
    • (2003) Proc. ACM Int. Conf. Mob. Syst., Appl., Serv. (MobiSys) , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 38
    • 0035060531 scopus 로고    scopus 로고
    • A formal approach to imperfection in geographic information
    • DOI 10.1016/S0198-9715(00)00040-5, PII S0198971500000405, GISRUK 2000
    • M. Duckham, K. Mason, J. Stell, and M. Worboys A formal approach to imperfection in geographic information Elsevier Comput., Environ., Urban Syst. 25 1 2001 89 103 (Pubitemid 32337731)
    • (2001) Computers, Environment and Urban Systems , vol.25 , Issue.1 , pp. 89-103
    • Duckham, M.1    Mason, K.2    Stell, J.3    Worboys, M.4
  • 39
    • 24944432404 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • Pervasive Computing: Third International Conference, PERVASIVE 2005, Proceedings
    • M. Duckham, and L. Kulit A formal model of obfuscation and negotiation for location privacy Proc. Int. Conf. Pervas. Comput., ser. Lecture Notes Comput. Sci. (LNCS) vol. 3468 May 2005 Springer-Verlag Munich, Germany 152 170 (Pubitemid 41313330)
    • (2005) Lecture Notes in Computer Science , vol.3468 , pp. 152-170
    • Duckham, M.1    Kulik, L.2
  • 41
    • 52649118020 scopus 로고    scopus 로고
    • SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
    • M.L. Yiu, C.S. Jensen, X. Huang, and H. Lu SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services Proc. IEEE Int. Conf. Data Eng. (ICDE), Cancun, Mexico Apr. 2008 366 375
    • (2008) Proc. IEEE Int. Conf. Data Eng. (ICDE), Cancun, Mexico , pp. 366-375
    • Yiu, M.L.1    Jensen, C.S.2    Huang, X.3    Lu, H.4
  • 45
    • 40949126919 scopus 로고    scopus 로고
    • A TTP-free protocol for location privacy in location-based services
    • A. Solanas, and A. Martínez-Ballesté A TTP-free protocol for location privacy in location-based services Elsevier Comput. Commun. 31 6 Apr. 2008 1181 1191
    • (2008) Elsevier Comput. Commun. , vol.31 , Issue.6 , pp. 1181-1191
    • Solanas, A.1    Martínez-Ballesté, A.2
  • 48
    • 8344276595 scopus 로고    scopus 로고
    • Privacy Preservation Improvement by Learning Optimal Profile Generation Rate
    • T. Kuflik, B. Shapira, Y. Elovici, and A. Maschiach Privacy preservation improvement by learning optimal profile generation rate User Modeling, ser. Lecture Notes Comput. Sci. (LNCS) vol. 2702 2003 Springer-Verlag 168 177 (Pubitemid 36768562)
    • (2003) Lecture Notes Comput. Sci. (LNCS) , Issue.2702 , pp. 168-177
    • Kuflik, T.1    Shapira, B.2    Elovici, Y.3    Maschiach, A.4
  • 49
    • 24944589228 scopus 로고    scopus 로고
    • Enhancing customer privacy while searching for products and services on the world wide web
    • DOI 10.1108/10662240510615164
    • Y. Elovici, C. Glezer, and B. Shapira Enhancing customer privacy while searching for products and services on the World Wide Web Internet Res. 15 4 2005 378 399 (Pubitemid 41314574)
    • (2005) Internet Research , vol.15 , Issue.4 , pp. 378-399
    • Elovici, Y.1    Glezer, C.2    Shapira, B.3
  • 52
    • 79958707212 scopus 로고    scopus 로고
    • Lessons from the identity trail: Privacy, anonymity and identity in a networked society
    • Oxford Univ. Press NY [Online]. Available
    • D.C. Howe, and H. Nissenbaum Lessons from the identity trail: privacy, anonymity and identity in a networked society ch. TrackMeNot: Resisting surveillance in web search 2006 Oxford Univ. Press NY http://mrl.nyu.edu/dhowe/ trackmenot [Online]. Available
    • (2006) Ch. TrackMeNot: Resisting Surveillance in Web Search
    • Howe, D.C.1    Nissenbaum, H.2
  • 53
    • 78049383252 scopus 로고    scopus 로고
    • [Online]. Available
    • V. Toubiana SquiggleSR http://www.squigglesr.com 2007 [Online]. Available
    • (2007) SquiggleSR
    • Toubiana, V.1
  • 58
    • 66549090154 scopus 로고    scopus 로고
    • Preserving user location privacy in mobile data management infrastructures
    • ser. Lecture Notes Comput. Sci. (LNCS) Springer-Verlag Cambridge, United Kingdom
    • R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar Preserving user location privacy in mobile data management infrastructures Proc. Workshop Privacy Enhanc. Technol. (PET) ser. Lecture Notes Comput. Sci. (LNCS) vol. 4258 2006 Springer-Verlag Cambridge, United Kingdom 393 412
    • (2006) Proc. Workshop Privacy Enhanc. Technol. (PET) , vol.4258 , pp. 393-412
    • Cheng, R.1    Zhang, Y.2    Bertino, E.3    Prabhakar, S.4
  • 59
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • DOI 10.1109/TMC.2007.1062
    • B. Gedik, and L. Liu Protecting location privacy with personalized k-anonymity: architecture and algorithms IEEE Trans. Mob. Comput. 7 1 Jan. 2008 1 18 (Pubitemid 350183929)
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 60
    • 57349191501 scopus 로고    scopus 로고
    • Supporting anonymous location queries in mobile environments with PrivacyGrid
    • B. Bamba, L. Liu, P. Pesti, and T. Wang Supporting anonymous location queries in mobile environments with PrivacyGrid Proc. Int. WWW Conf., Beijing, China Apr. 2008 237 246
    • (2008) Proc. Int. WWW Conf., Beijing, China , pp. 237-246
    • Bamba, B.1    Liu, L.2    Pesti, P.3    Wang, T.4
  • 63
    • 76049114679 scopus 로고    scopus 로고
    • Private location-based information retrieval through user collaboration
    • [Online]. Available
    • D. Rebollo-Monedero, J. Forné, A. Solanas, and T. Martínez-Ballesté Private location-based information retrieval through user collaboration Elsevier Comput. Commun. 33 6 2010 762 774 http://dx.doi.org/10.1016/j.comcom.2009.11.024 [Online]. Available
    • (2010) Elsevier Comput. Commun. , vol.33 , Issue.6 , pp. 762-774
    • Rebollo-Monedero, D.1    Forné, J.2    Solanas, A.3    Martínez- Ballesté, T.4
  • 67
    • 0001457509 scopus 로고
    • Some methods for classification and analysis of multivariate observations
    • (Statistics), Berkeley, CA, 1965-1966 (symposium) (proceedings)
    • J. B. MacQueen, "Some methods for classification and analysis of multivariate observations," in Proc. Berkeley Symp. Math. Stat., Prob., vol. I (Statistics), Berkeley, CA, 1965-1966 (symposium), 1967 (proceedings), pp. 281-297.
    • (1967) Proc. Berkeley Symp. Math. Stat., Prob , vol.1 , pp. 281-297
    • MacQueen, J.B.1
  • 68
    • 33747479974 scopus 로고
    • Sur la division des corps matériels en parties
    • H. Steinhaus Sur la division des corps matériels en parties Bull. Pol. Acad. Sci. IV 12 Mar. 1956 801 804
    • (1956) Bull. Pol. Acad. Sci. , vol.IV , Issue.12 , pp. 801-804
    • Steinhaus, H.1
  • 69
    • 85032752137 scopus 로고    scopus 로고
    • Theoretical foundations of transform coding
    • DOI 10.1109/79.952802
    • V.K. Goyal Theoretical foundations of transform coding IEEE Signal Processing Mag. 18 5 Sep. 2001 9 21 (Pubitemid 32932331)
    • (2001) IEEE Signal Processing Magazine , vol.18 , Issue.5 , pp. 9-21
    • Goyal, V.K.1
  • 70
    • 0028499659 scopus 로고
    • Three-dimensional subband coding with motion compensation
    • J.-R. Ohm Three-dimensional subband coding with motion compensation IEEE Trans. Image Processing 3 5 Sep. 1994 559 571
    • (1994) IEEE Trans. Image Processing , vol.3 , Issue.5 , pp. 559-571
    • Ohm, J.-R.1
  • 74
    • 71749120353 scopus 로고    scopus 로고
    • Text document clustering based on neighbors
    • C. Luo, Y. Li, and S.M. Chung Text document clustering based on neighbors Elsevier Data, Knowl. Eng. 68 11 Nov. 2009 1271 1288
    • (2009) Elsevier Data, Knowl. Eng. , vol.68 , Issue.11 , pp. 1271-1288
    • Luo, C.1    Li, Y.2    Chung, S.M.3
  • 75
    • 79951676428 scopus 로고    scopus 로고
    • Document clustering using synthetic cluster prototypes
    • A. Kalogeratos, and A. Likas Document clustering using synthetic cluster prototypes Elsevier Data, Knowl. Eng. 70 3 Mar. 2011 284 306
    • (2011) Elsevier Data, Knowl. Eng. , vol.70 , Issue.3 , pp. 284-306
    • Kalogeratos, A.1    Likas, A.2
  • 78
    • 0022683355 scopus 로고
    • Global convergence and empirical consistency of the generalized Lloyd algorithm
    • M. Sabin, and R.M. Gray Global convergence and empirical consistency of the generalized Lloyd algorithm IEEE Trans. Inform. Theory IT-32, no. 2 Mar. 1986 148 155 (Pubitemid 16613622)
    • (1986) IEEE Transactions on Information Theory , vol.IT-32 , Issue.2 , pp. 148-155
    • Sabin Michael, J.1    Gray Robert, M.2
  • 79
    • 0039073042 scopus 로고
    • Consistency of data-driven histogram methods for density estimation and classification
    • uIUC-BI-93-01.
    • G. Lugosi, and A.B. Nobel Consistency of data-driven histogram methods for density estimation and classification Beckman Inst., Univ. of Illinoi, Tech. Rep. 1993 uIUC-BI-93-01.
    • (1993) Beckman Inst., Univ. of Illinoi, Tech. Rep.
    • Lugosi, G.1    Nobel, A.B.2
  • 80
    • 0030085873 scopus 로고    scopus 로고
    • Convergence properties of a class of learning vector quantization algorithms
    • PII S1057714996014078
    • E.B. Kosmatopoulos, and M.A. Christodoulou Convergence properties of a class of learning vector quantization algorithms IEEE Trans. Image Processing 5 2 Feb. 1996 361 368 (Pubitemid 126777648)
    • (1996) IEEE Transactions on Image Processing , vol.5 , Issue.2 , pp. 361-368
    • Kosmatopoulos, E.B.1    Christodoulou, M.A.2
  • 81
    • 0001362410 scopus 로고
    • The Levenberg-Marquardt algorithm: Implementation and theory
    • G.A. Watson, Springer-Verlag
    • J.J. Moré The Levenberg-Marquardt algorithm: Implementation and theory G.A. Watson, Numerical Analysis, ser. Lecture Notes Math vol. 630 1977 Springer-Verlag 105 116
    • (1977) Numerical Analysis, Ser. Lecture Notes Math , vol.630 , pp. 105-116
    • Moré, J.J.1
  • 82
    • 78049387733 scopus 로고    scopus 로고
    • On a global complexity bound of the Levenberg-Marquardt method
    • K. Ueda, and N. Yamashita On a global complexity bound of the Levenberg-Marquardt method J. Optim. Theory, Appl. 147 2010 443 453
    • (2010) J. Optim. Theory, Appl. , Issue.147 , pp. 443-453
    • Ueda, K.1    Yamashita, N.2
  • 84
    • 0032143765 scopus 로고    scopus 로고
    • A trivariate distribution for the height, weight, and fat of adult men
    • D.E. Burmaster, and D.M. Murray A trivariate distribution for the height, weight, and fat of adult men Risk Anal. 18 4 1998 385 389
    • (1998) Risk Anal. , vol.18 , Issue.4 , pp. 385-389
    • Burmaster, D.E.1    Murray, D.M.2
  • 86
    • 80051790393 scopus 로고    scopus 로고
    • Computational Aspects of Statistical Confidentiality project
    • CASC European project IST-2000-25069 CASC [Online]
    • CASC, "Computational Aspects of Statistical Confidentiality project," European project IST-2000-25069 CASC, Tech. Rep., 2001-2004. [Online]. Available: http://neon.vb.cbs.nl/casc
    • Tech. Rep., 2001-2004


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.