COMP 7370 Advanced Computer and Network Security The MinGen Algorithm - PowerPoint PPT Presentation

About This Presentation
Title:

COMP 7370 Advanced Computer and Network Security The MinGen Algorithm

Description:

Title: CS 331 Computer Architecture Author: Xiao Qin Last modified by: Xiao Qin Created Date: 8/22/2006 10:53:10 PM Document presentation format: On-screen Show – PowerPoint PPT presentation

Number of Views:76
Avg rating:3.0/5.0
Slides: 11
Provided by: Xiao135
Category:

less

Transcript and Presenter's Notes

Title: COMP 7370 Advanced Computer and Network Security The MinGen Algorithm


1
COMP 7370 Advanced Computer and Network
SecurityThe MinGen Algorithm
Dr. Xiao Qin Auburn Universityhttp//www.eng.aubu
rn.edu/xqin xqin_at_auburn.edu
Spring, 2011
2
Step 1 PT vs. PTQI
vs.
3
Step 2 history lt- d_1, d_n
Use subscripts to represent generalization
strategies.
n 2 E_0 -gt d_1 0 Z_0 -gt d_2 0
E_1 -gt d_1 ? Z_2 -gt d_2 ?
E_1 -gt d_1 1 Z_2 -gt d_2 2
4
Step 2 history lt- d_1, d_n
Note E_i and Z_j must be specific when you
implement the MinGen algorithm. You must specify
your generalization strategies. For example
5
Step 2 E_i, Z_j
n 2 E_0 -gt d_1 0 Z_0 -gt d_2 0
E_1 -gt d_1 ? Z_2 -gt d_2 ?
E_1 -gt d_1 1 Z_2 -gt d_2 2
6
Step 3 Check single attributes
  • Each single attribute must satisfy k-anonymity

E -gt MGTE v a -gt freq(a, MGTE) ? If 4 lt
k then what does this mean?
What should we do?
4
7
Step 3.1 Check single attributes
  • Each single attribute must satisfy k-anonymity

4
If 4 lt k then we need data generalization! V_E
d_E, d_Z 1, 0 not 0, 1 Note move one
step at a time.
8
Step 3.2 the generalize() function
  • Each single attribute must satisfy k-anonymity

E -gt MGTE Value v a -gt freq(a, MGTE)
? If 4 lt k then what does this mean? V_E
d_E, d_Z 1, 0 MGT lt- generalize(MGT, V_E,
0,0)
4
9
Step 3.2 the generalize() function
  • Each single attribute must satisfy k-anonymity

MGT lt- generalize(MGT, v, h) Generalize()
transform MGT based on a generalization strategy
specified by v, h.
10
Step 3.3 update the history vector
  • Each single attribute must satisfy k-anonymity

Can you give me an example to illustrate how step
3.3 works?
History d_E, d_Z 0, 0 V_E 1, 0 New
History 0, 0 1, 0 1, 0
Write a Comment
User Comments (0)
About PowerShow.com