首页> 外文会议>Asia-Pacific Web Conference >On the Complexity of Restricted fc-anonymityProblem
【24h】

On the Complexity of Restricted fc-anonymityProblem

机译:论限制性FC-匿名问题的复杂性

获取原文

摘要

One of the emerging concepts in microdata protection is k-anonymity, introduced by Samarati and Sweeney. k-anonymity provides a simple and efficient approach to protect private individual information and is gaining increasing popularity. k-anonymity requires that every tu-ple(record) in the microdata table released be indistinguishably related to no fewer than k respondents. In this paper, we introduce two new variants of the k-anonymity problem, namely, the Restricted k-anonymity problem and Restricted k-anonymity problem on attribute (where suppressing the entire attribute is allowed). We prove that both problems are NP-hard for k ≥ 3. The results imply the main results obtained by Meyerson and Williams. On the positive side, we develop a polynomial time algorithm for the Restricted 2-anonymity problem by giving a graphical representation of the microdata table.
机译:Microdata保护中的新兴概念之一是萨马拉蒂和斯威伊介绍的k-匿名。 k-匿名提供了一种简单而有效的方法来保护私人信息,并且正在增加越来越受欢迎。 k-匿名要求,Microdata表中的每个TU-PLE(记录)发布释放地与少于K受访者无区别。在本文中,我们介绍了k-匿名问题的两个新变体,即,受限制的k-匿名问题和属性的受限k-匿名问题(其中允许抑制整个属性)。我们证明这两个问题都是NP - k≥3.结果意味着Meyerson和Williams获得的主要结果。在正侧,我们通过提供微数据表的图形表示,开发用于限制的2 - 匿名问题的多项式时间算法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号