指导
网站地图
presentation report格式 case study Summary范文 PEST分析法 literature review Research Proposal Reference格式
返回首页

加拿大计算机专业summary范文:Incognito: Efficient FullDomain KAnonymity

论文价格: 免费 时间:2019-07-09 10:04:57 来源:www.ukassignment.org 作者:留学作业网
Summary总结
本文的背景是许多组织为了公共卫生和人口研究等目的发布微数据。虽然明确标识个人的属性通常被删除,但这些数据库有时可以与属性上的其他公共数据库连接,以重新标识应该保持匿名的个人。通过互联网提供其他补充数据库,使“加入”攻击更加容易。因此,Kristen Lefevre、David J.Dewitt和Raghu Ramakrishnan在他们的论文中指出,K匿名化是一种通过归纳和/或抑制部分发布的微数据来防止加入攻击的技术。
The background of this paper is that a number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals are generally removed, these databases can sometimes be joined with other public databases on attributes to re-identify individuals who were supposed to remain anonymous. “Joining” attacks are made easier by the availability of other, complementary, databases over the Internet. Therefore, Kristen LeFevre, David J.Dewitt and Raghu Ramakrishnan  in their paper pointed that the K-anonymization is a technique that prevents joining attacks by generalizing and/or suppressing portions of the released microdata. 
本文首先以病人表为例进行分析。在本例中,名称作为移除属性。这种属性组合的独特性导致了一类攻击,通过连接多个(通常是公开可用的)数据集来“重新识别”数据。此外,在这个运行的示例中,攻击可以通过在三个数据集(包括生日、性别和邮政编码)上加入两个数据库来确定一个人的医疗信息。通过这个例子的说明,我们可以看到K匿名是必要的。
其次,本文综述了K-匿名化的泛化和抑制框架,特别是一个称为全域泛化的模型。本节还描述了以前实现最小全域泛化的算法。
第三,介绍了一种基于多维数据模型的全域通用化的实现框架,以及一套算法,这套算法被称为不可识别算法。incognito利用了以前在查询处理文献中用于其他目的的动态编程的两个关键变化:沿维度层次的自底向上聚合和先验聚合计算。
第四,给出了最大规模性能实验的结果,并对最小k-匿名化进行了实验研究。同时,研究结果表明,该算法在数量级上优于以前的算法。结果证明了在大型数据库上执行最小看门化的可行性。
虽然本文的算法和框架主要集中在全域泛化模型上,但也有许多其他的K-匿名模型被提出。然而,这些技术之间的差异还没有清楚地表达出来。因此,在最后,作者对几种替代的K匿名方法进行了统一的分类。In this paper, the authors first use a Patients table as a running example. In this example, the name is as the removing attribute. The uniqueness of such attribute combinations leads to a class of attacks where data is “re-identified” by joining multiple (often publicly-available) data sets. Also, in this running example, the attack is able to determine one person’s medical information by joining the two databases on three data sets including Birthdate, Sex and Zipcode. Through the illustration of  this example, we can see that the K-anonymity is necessary.
Second, the authous give an overview of the generalization and suppression framework for k-anonymization, in particular a model called full-domain generalization. Also previous algorithms implementing minimal full-domain generalization has been descriped in this section.
Third, an implementation framework for full-domain generalization using a multi-dimensional data model has been introduced, together with a suite of algorithms and this suite of algorithms is called Incognito. Incognito takes advantage of two key variations of dynamic programming that have been used previously in the query processing literature for other purposes: bottom-up aggregation along dimensional hierarchies and a priori aggregate computation.
Fouth, the results of the largest-scale performance experiments have been presented and the experiments are aware of for minimal k-anonymization. Also, the results show that the Incognito algorithms outperform previous algorithms by up to an order of magnitude. The results demonstrate the feasibility of performing minimal kanonymization on large databases.
Though in this paper the algorithms and framework focus primarily on the full-domain generalization model, there have been a number of other k-anonymization models proposed. However, the differences among these techniques have not been clearly articulated. Therefore, in the last, the authors have done the unifying taxonomy of several alternative approaches to k-anonymization. 
 
Contributions
Totally, there are two contributions in this paper. First, in this paper, the authors develop a core algorithm which is named Incognito according to Samarati and Sweeneny’s generalization framework. The basic Incognito algorithm is used to impletment the Patients table. The authors work hard to optimizations this basic Incognito algorithm. They first introduce the super-roots into this algorithm as Super roots Incognito and second introduce the bottom-up pre-computation to the basic Incognito algorithm as Cube Incognito. The authors in this paper are introducing a set of algorithms for producing minimal full-domain generalizations and the results show that these algorithms perform up to an order of magnitude faster than previous algorithms on two real-life databases. The second contribution is a single taxonomy that categorizes previous models and introduces some promising new alternatives .
 
Weakness
However, there are weakness of this paper. First, the set of algorithm has been implemented just for the example of Patients table and the results for the experiments may be not correct. Second, the taxnmy of k-anonymization models is according to three main criteria: Generalization vs. Suppression, Global vs. Local recoding and Hierarchy-based vs. Partition-based. There are some models for the taxonomy. However, in this paper, the Incognito algorithm has not been developed for the each model of all the taxonomy categorizing k-anonymization models.
 
Discussion questions
There are many anonymization mechanism that the data of attributes can be generalized, suppressed or distort. The database in the real life often mucn complexity and refers to much attributes. The question I am much confusing is that how to proof that the full-domain generalization is mimimal if this generalization is K-anonymous besides this simple Patients table.
 
此论文免费


如果您有论文代写需求,可以通过下面的方式联系我们
点击联系客服
如果发起不了聊天 请直接添加QQ 923678151
923678151
推荐内容
  • Summary怎么写?Sum...

    Summary在本科生和研究生的写作作业中非常普遍,在许多课程中,教授和指导老师会要求我们在完成一些文章阅读后进行文章总结。通过Summary(总结),教授能够......

  • 英国留学生论文Executi...

    组织变革的最大挑战是所采取的时间。如果计划是不正确的,目标是不明确的,那么整个变化过程可能需要更多的时间是应该采取的措施。...

  • summary写法解答

    摘要(summary)是一种对原始文献(或文章)的基本内容进行浓缩的语义连贯的短文。它以迅速掌握原文内容梗概为目的,不加主观评论和解释,但必须简明、确切地表述原......

  • Summary范文:Refl...

    主要内容是批判性地审视伦敦建筑中的后现代主义,并且提供相对应的图片进行描述,从整体上审视和细化伦敦的教育体系,是一篇典型的国外大学课程作业所必要的Reflect......

  • 大学英文文章的Summary...

    summary writing是一种控制性的作文形式,它能使学生通过阅读原文,吸收原文的文章结构与语言方面的长处,一般不会占文章分数主要因素。...

  • 本科论文Summary范文 ...

    本文是一篇英国留学生商务管理课程作业的summary的格式范文,旨在找出中国时装设计师品牌目前面临的机遇与风险。...

923678151