Top Banner
1 Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover Algorithm (2)
19

COMP 7370 Advanced Computer and Network Security The VectorCover Algorithm (2)

Jan 03, 2016

Download

Documents

kellie-estes

COMP 7370 Advanced Computer and Network Security The VectorCover Algorithm (2). Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected]. Spring, 2011. Minimal Distance Vectors. The Outlier Set and All Set. Outliers: Tuples which have less than k occurrences - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

1

Dr. Xiao Qin

Auburn Universityhttp://www.eng.auburn.edu/~xqin

[email protected]

Spring, 2011

COMP 7370 Advanced Computer and Network Security

The VectorCover Algorithm (2)

Page 2: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

2

Minimal Distance Vectors

Page 3: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

3

The Outlier Set and All Set

• Outliers: Tuples which have less than k occurrences

• All: a set of distinct tuples in a table

Page 4: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

4

Pair – (strategy, tuples)

• New data structure

• Represents a transformation strategy

• Represents a set of tuples after applying such a transformation.

• Strategy = Distrance Vectors

Page 5: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

5

Distance between Two Tuples

Page 6: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

6

The VectorCover Algorithm

Page 7: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

7

Dr. Xiao Qin

Auburn Universityhttp://www.eng.auburn.edu/~xqin

[email protected]

Spring, 2011

COMP 7370 Advanced Computer and Network Security

The MinGen Algorithm

Page 8: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

8

Page 9: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

9

Step 1: PT vs. PT[QI]

vs.

Page 10: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

10

Step 2: history <- [d_1, … d_n]

n =2

E_0 -> d_1 = 0

Z_0 -> d_2 = 0

E_1 -> d_1 = ?

Z_2 -> d_2 = ?

E_1 -> d_1 = 1

Z_2 -> d_2 = 2

Use subscripts to represent generalization strategies.

Page 11: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

11

Step 2: history <- [d_1, … d_n]Note: E_i and Z_j must be specific when you implement the MinGen algorithm.

You must specify your generalization strategies. For example:

Page 12: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

12

Step 2: E_i, Z_j

n =2

E_0 -> d_1 = 0

Z_0 -> d_2 = 0

E_1 -> d_1 = ?

Z_2 -> d_2 = ?

E_1 -> d_1 = 1

Z_2 -> d_2 = 2

Page 13: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

13

Step 3: Check single attributes• Each single attribute must satisfy k-anonymity

E -> MGT[E]

v = a -> freq(a, MGT[E]) = ?

If 4 < k then what does this mean?

What should we do?

4

Page 14: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

14

Step 3.1: Check single attributes• Each single attribute must satisfy k-anonymity

If 4 < k then we need data generalization!

V_E = [d_E, d_Z] = [1, 0] not [0, 1]

Note: move one step at a time.

Page 15: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

15

Step 3.2: the generalize() function• Each single attribute must satisfy k-anonymity

E -> MGT[E]

Value v = a -> freq(a, MGT[E]) = ?

If 4 < k then what does this mean?

V_E = [d_E, d_Z] = [1, 0]

MGT <- generalize(MGT, V_E, [0,0])

4

Page 16: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

16

Step 3.2: the generalize() function• Each single attribute must satisfy k-anonymity

MGT <- generalize(MGT, v, h)

Generalize() transform MGT based on a generalization strategy specified by v, h.

Page 17: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

17

Step 3.3: update the history vector• Each single attribute must satisfy k-anonymity

Can you give me an example to illustrate how step 3.3 works?

History [d_E, d_Z] = [0, 0]

V_E = [1, 0]

New History [0, 0] + [1, 0] = [1, 0]

Page 18: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

Step 6.2

18

Page 19: COMP 7370  Advanced Computer and Network Security The VectorCover Algorithm (2)

Step 6.3

19