Hosein Mohammadinejad

Work place: Sheikhbahaee University, Isfahan, Iran

E-mail: mohammadi.n@shbu.ac.ir

Website:

Research Interests: Computational Science and Engineering, Computational Engineering, Computer systems and computational processes, Computer Architecture and Organization

Biography

Hosein Mohammadinejad, received the B.Sc. degree in computer engineering in 2000 from University of Tehran, Tehran, Iran, and the M.Sc. degree in computer engineering from University of Isfahan, Isfahan, Iran, in 2003. He is currently working toward a Ph.D. degree with the Department of Computer Engineering, University of Isfahan, Isfahan, Iran. He has worked as a Lecturer at Sheikhbahaee University, Isfahan, Iran, since 2003.

Author Articles
Extended K-Anonymity Model for Privacy Preserving on Micro Data

By Masoud Rahimi Mehdi Bateni Hosein Mohammadinejad

DOI: https://doi.org/10.5815/ijcnis.2015.12.05, Pub. Date: 8 Nov. 2015

Today, information collectors, particularly statistical organizations, are faced with two conflicting issues. On one hand, according to their natural responsibilities and the increasing demand for the collected data, they are committed to propagate the information more extensively and with higher quality and on the other hand, due to the public concern about the privacy of personal information and the legal responsibility of these organizations in protecting the private information of their users, they should guarantee that while providing all the information to the population, the privacy is reasonably preserved. This issue becomes more crucial when the datasets published by data mining methods are at risk of attribute and identity disclosure attacks. In order to overcome this problem, several approaches, called p-sensitive k-anonymity, p+-sensitive k-anonymity, and (p, α)-sensitive k-anonymity, were proposed. The drawbacks of these methods include the inability to protect micro datasets against attribute disclosure and the high value of the distortion ratio. In order to eliminate these drawbacks, this paper proposes an algorithm that fully protects the propagated micro data against identity and attribute disclosure and significantly reduces the distortion ratio during the anonymity process.

[...] Read more.
Other Articles