Auburn University http://www.eng.auburn.edu/~xqin COMP 7370 Advanced Computer and Network Security The VectorCover Algorithm (2) Dr. Xiao Qin Auburn.

Slides:



Advertisements
Similar presentations
Fig. 4-1, p Fig. 4-2, p. 109 Fig. 4-3, p. 110.
Advertisements

1 COMP 4300 Computer Architecture Datapath Dr. Xiao Qin Auburn University Fall, 2010.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Slide 1Fig. 22.1, p.669. Slide 2Fig. 22.3, p.670.
Slide 1Fig. 17.1, p.513. Slide 2Table 17.1, p.514.
P.464. Table 13-1, p.465 Fig. 13-1, p.466 Fig. 13-2, p.467.
P449. p450 Figure 15-1 p451 Figure 15-2 p453 Figure 15-2a p453.
Fig. 11-1, p p. 360 Fig. 11-2, p. 361 Fig. 11-3, p. 361.
1 Dr. Xiao Qin Auburn University Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover.
1 Dr. Xiao Qin Auburn University Spring, 2011 COMP 7370 Advanced Computer and Network Security Generalizing.
1 Dr. Xiao Qin Auburn University Spring, 2011 COMP 7370 Advanced Computer and Network Security The MinGen.
Table 6-1, p Fig. 6-1, p. 162 p. 163 Fig. 6-2, p. 164.
1 Dr. Xiao Qin Auburn University Spring, 2011 COMP 7370 Advanced Computer and Network Security Generalizing.
1 Dr. Xiao Qin Auburn University Spring, 2011 COMP 7370 Advanced Computer and Network Security Homework.
1 Dr. Xiao Qin Auburn University Spring, 2011 COMP 7370 Advanced Computer and Network Security The VectorCover.
1 Dr. Xiao Qin Auburn University Spring, 2011 COMP 7370 Advanced Computer and Network Security Homework.
Protecting Privacy when Disclosing Information Pierangela Samarati Latanya Sweeney.
Supplementary Text 2. If the relationship between two random variables X and Y is approximately illustrated in the following figure, then how can we discretize.
Deanship of Distance Learning Avicenna Center for E-Learning 1 Session - 7 Sequence - 2 Normalization Functional Dependencies Presented by: Dr. Samir Tartir.
1 Exercise Sheet 3 Exercise 7.: ROLAP Algebra Assume that a fact table SalesCube has 3 hierarchies with attributes  ear , Month M, Productgroup P and.
Anonymizing Data with Quasi-Sensitive Attribute Values Pu Shi 1, Li Xiong 1, Benjamin C. M. Fung 2 1 Departmen of Mathematics and Computer Science, Emory.
Parallel and Distributed Simulation Data Distribution II.
© Yilmaz “Introduction to Discrete-Event Simulation” 1 Introduction to Discrete-Event Simulation Dr. Levent Yilmaz M&SNet: Auburn M&S Laboratory.
The relational model1 The relational model Mathematical basis for relational databases.
Chapter 1 Review - Get a whiteboard and marker per pair - Take out a blank sheet of paper.
COMP7330/7336 Advanced Parallel and Distributed Computing Task Partitioning Dr. Xiao Qin Auburn University
COMP7330/7336 Advanced Parallel and Distributed Computing Task Partitioning Dynamic Mapping Dr. Xiao Qin Auburn University
1 The graph represents a function because each domain value (x-value) is paired with exactly one range value (y-value). Notice that the graph is a straight.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Tree-Based Networks Cache Coherence Dr. Xiao Qin Auburn University
Project 2: Phase 1 Submission 7 Late submissions 10% 10 No submissions 14% Better than project 1 phase 3 submissions 10-point bonus: If you catch the deadline.
Today we will solve equations with two variables. Solve = figure out.
COMP7330/7336 Advanced Parallel and Distributed Computing OpenMP: Programming Model Dr. Xiao Qin Auburn University
COMP7330/7336 Advanced Parallel and Distributed Computing MapReduce - Introduction Dr. Xiao Qin Auburn University
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Decomposition and Parallel Tasks (cont.) Dr. Xiao Qin Auburn University
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
Fig. 6-CO, p p. 185a p. 185b p. 185c p. 185d.
COMP 3500 Introduction to Operating Systems Memory Management: Part 2 Dr. Xiao Qin Auburn University Slides.
Auburn University COMP 2710 Software Construction Use Case Analysis – Examples and Exercises Dr. Xiao Qin Auburn University.
COMP 2710 Software Construction Project 2 – Analysis of auDiskTool
Auburn University COMP 3500 Introduction to Operating Systems Resource Allocation Graphs Handling Deadlocks Dr. Xiao.
Auburn University COMP8330/7330/7336 Advanced Parallel and Distributed Computing Parallel Hardware Dr. Xiao Qin Auburn.
Auburn University
Auburn University
COMP 2710 Software Construction Project 2 – Analysis of auDiskTool
Authors: Jiang Xie, Ian F. Akyildiz
Auburn University
Auburn University COMP7330/7336 Advanced Parallel and Distributed Computing Exploratory Decomposition Dr. Xiao Qin Auburn.
Poster Project Energy Transformations
Auburn University COMP7330/7336 Advanced Parallel and Distributed Computing Odd-Even Sort Implementation Dr. Xiao Qin.
Auburn University COMP8330/7330/7336 Advanced Parallel and Distributed Computing Interconnection Networks (Part 2) Dr.
Normalization Functional Dependencies Presented by: Dr. Samir Tartir
COMP 2710 Software Construction Homework 2 – Design and Algorithm
Auburn University COMP7330/7336 Advanced Parallel and Distributed Computing MapReduce - Introduction Dr. Xiao Qin Auburn.
Auburn University COMP7330/7336 Advanced Parallel and Distributed Computing Parallel Odd-Even Sort Algorithm Dr. Xiao.
Handouts Software Testing and Quality Assurance Theory and Practice Chapter 6 Domain Testing
Auburn University COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs (cont.) Dr. Xiao.
Auburn University COMP7500 Advanced Operating Systems I/O-Aware Load Balancing Techniques (2) Dr. Xiao Qin Auburn University.
Lecture 13 review Explain how distance vector algorithm works.
Geometry Honors Day 2: Reflections
Objectives Identify linear functions and linear equations.
The graph represents a function because each domain value (x-value) is paired with exactly one range value (y-value). Notice that the graph is a straight.
Lengths of Sides of a Triangle Drawing Inferences
Energy-Efficient Storage Systems
Hierarchical Modeling & Constructive Solid Geometry
Advanced System Security
Geometry Honors Day 2: Reflections
Fig. 6-CO, p. 211.
07CO, p. 190.
Networks Prim’s Algorithm
COMP 7370 Advanced Computer and Network Security Comments on Project 1
Presentation transcript:

Auburn University http://www.eng.auburn.edu/~xqin COMP 7370 Advanced Computer and Network Security The VectorCover Algorithm (2) Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.edu Parking problem. Go to office at 6:30 or 8:30 to bypass traffic jam Spring, 2011

Minimal Distance Vectors Note: show Fig. 4 (a) in the k-anonymity paper on the white board. Explain distance vector Intuitively, the the minimal generalizations of table Ti are exactly those tables Tj satisfying k-anonymity with minimal distance vectors DVi;j . For instance, with reference to the generalized tables illustrated in Figure 3 we have already noticed how, for k = 3, GT[1;1] cannot be minimal because GT[0;1] and GT[1;0] also satisfy k-anonimity.

The Outlier Set and All Set Outliers: Tuples which have less than k occurrences All: a set of distinct tuples in a table

Pair – (strategy, tuples) New data structure Represents a transformation strategy Represents a set of tuples after applying such a transformation. Strategy = Distrance Vectors

Distance between Two Tuples

The VectorCover Algorithm Draw (1) Fig. 3 table PT and (2) Fig. 4(a) on the white board

COMP 7370 Advanced Computer and Network Security The MinGen Algorithm Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.edu Parking problem. Go to office at 6:30 or 8:30 to bypass traffic jam Spring, 2011

Step 1: PT vs. PT[QI] vs.

Step 2: history <- [d_1, … d_n] Use subscripts to represent generalization strategies. n =2 E_0 -> d_1 = 0 Z_0 -> d_2 = 0 Use subscripts to represent generalization strategies. E_1 -> d_1 = ? Z_2 -> d_2 = ? E_1 -> d_1 = 1 Z_2 -> d_2 = 2

Step 2: history <- [d_1, … d_n] Note: E_i and Z_j must be specific when you implement the MinGen algorithm. You must specify your generalization strategies. For example: Use subscripts to represent generalization strategies.

Step 2: E_i, Z_j n =2 E_0 -> d_1 = 0 Z_0 -> d_2 = 0 Use subscripts to represent generalization strategies. E_1 -> d_1 = ? Z_2 -> d_2 = ? E_1 -> d_1 = 1 Z_2 -> d_2 = 2

Step 3: Check single attributes Each single attribute must satisfy k-anonymity E -> MGT[E] v = a -> freq(a, MGT[E]) = ? If 4 < k then what does this mean? What should we do? 4

Step 3.1: Check single attributes Each single attribute must satisfy k-anonymity 4 If 4 < k then we need data generalization! V_E = [d_E, d_Z] = [1, 0] not [0, 1] Note: move one step at a time.

Step 3.2: the generalize() function Each single attribute must satisfy k-anonymity E -> MGT[E] Value v = a -> freq(a, MGT[E]) = ? If 4 < k then what does this mean? V_E = [d_E, d_Z] = [1, 0] MGT <- generalize(MGT, V_E, [0,0]) 4

Step 3.2: the generalize() function Each single attribute must satisfy k-anonymity MGT <- generalize(MGT, v, h) Generalize() transform MGT based on a generalization strategy specified by v, h.

Step 3.3: update the history vector Each single attribute must satisfy k-anonymity Can you give me an example to illustrate how step 3.3 works? History [d_E, d_Z] = [0, 0] V_E = [1, 0] New History [0, 0] + [1, 0] = [1, 0]

Step 6.2

Step 6.3