19
1 Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover Algorithm (2)

1 Dr. Xiao Qin Auburn University xqin [email protected] Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

1

Dr. Xiao Qin

Auburn Universityhttp://www.eng.auburn.edu/~xqin

[email protected]

Spring, 2011

COMP 7370 Advanced Computer and Network Security

The VectorCover Algorithm (2)

Page 2: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

2

Minimal Distance Vectors

Page 3: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

3

The Outlier Set and All Set

• Outliers: Tuples which have less than k occurrences

• All: a set of distinct tuples in a table

Page 4: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

4

Pair – (strategy, tuples)

• New data structure

• Represents a transformation strategy

• Represents a set of tuples after applying such a transformation.

• Strategy = Distrance Vectors

Page 5: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

5

Distance between Two Tuples

Page 6: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

6

The VectorCover Algorithm

Page 7: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

7

Dr. Xiao Qin

Auburn Universityhttp://www.eng.auburn.edu/~xqin

[email protected]

Spring, 2011

COMP 7370 Advanced Computer and Network Security

The MinGen Algorithm

Page 8: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

8

Page 9: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

9

Step 1: PT vs. PT[QI]

vs.

Page 10: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

10

Step 2: history <- [d_1, … d_n]

n =2

E_0 -> d_1 = 0

Z_0 -> d_2 = 0

E_1 -> d_1 = ?

Z_2 -> d_2 = ?

E_1 -> d_1 = 1

Z_2 -> d_2 = 2

Use subscripts to represent generalization strategies.

Page 11: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

11

Step 2: history <- [d_1, … d_n]Note: E_i and Z_j must be specific when you implement the MinGen algorithm.

You must specify your generalization strategies. For example:

Page 12: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

12

Step 2: E_i, Z_j

n =2

E_0 -> d_1 = 0

Z_0 -> d_2 = 0

E_1 -> d_1 = ?

Z_2 -> d_2 = ?

E_1 -> d_1 = 1

Z_2 -> d_2 = 2

Page 13: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

13

Step 3: Check single attributes• Each single attribute must satisfy k-anonymity

E -> MGT[E]

v = a -> freq(a, MGT[E]) = ?

If 4 < k then what does this mean?

What should we do?

4

Page 14: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

14

Step 3.1: Check single attributes• Each single attribute must satisfy k-anonymity

If 4 < k then we need data generalization!

V_E = [d_E, d_Z] = [1, 0] not [0, 1]

Note: move one step at a time.

Page 15: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

15

Step 3.2: the generalize() function• Each single attribute must satisfy k-anonymity

E -> MGT[E]

Value v = a -> freq(a, MGT[E]) = ?

If 4 < k then what does this mean?

V_E = [d_E, d_Z] = [1, 0]

MGT <- generalize(MGT, V_E, [0,0])

4

Page 16: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

16

Step 3.2: the generalize() function• Each single attribute must satisfy k-anonymity

MGT <- generalize(MGT, v, h)

Generalize() transform MGT based on a generalization strategy specified by v, h.

Page 17: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

17

Step 3.3: update the history vector• Each single attribute must satisfy k-anonymity

Can you give me an example to illustrate how step 3.3 works?

History [d_E, d_Z] = [0, 0]

V_E = [1, 0]

New History [0, 0] + [1, 0] = [1, 0]

Page 18: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

Step 6.2

18

Page 19: 1 Dr. Xiao Qin Auburn University xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover

Step 6.3

19