CS 5473 assignment 4Due on Monday, Mar 23, 2020Each student is required to do this assignment individually and submit a hard copyof the solution on the due date.The solution should also include the following information:Name, Student Number, Course Number (CS 5473) and your email address.Assignments which are not met the above requirements will not be marked. The scoreof the assignment will depend on:Specifcation and documentation: 20 %Correctness: 80 %Late assignments will be penalized and will not be accepted after 3 days.————————————————————————–Problem 1.The following is a table of relational database which recorded information of studentconsisting of name, sex, race, packing fnes, dorm, student ID number, and credit cardnumber.
Name Sex Race Fines Dorm SID CreditCardAdams Fein · · · M F · · · C B · · · 45. 0 · · · Holmes West · · · 501283 501236 · · · 45012345129820454502238938173928· · ·
For the security reason, we want to partially encrypt the table. Namely, the attributesname, packing fnes, ID and credit card number should be encrypted. The other attributesare not encrypted to keep general access effciency.Now you are asked to design how to create a new table from the original table. For thedesign you need to consider• The new table can still provide partial statistical information.• Use less time for encryption and decryption if possible.• Easy to implement by software and hardware.• Still support most SQL requests.1Problem 2.Figure 1 shows medical records from a fctitious hospital.
ID QI SVZip Code Age Nationality Condition1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 13053 13053 13068 13068 13068 14850 13053 13053 14853 14853 14850 14850 13053 13068 13068 28 36 35 29 21 46 31 23 50 55 47 49 37 36 38 Russian Japanese American American Japanese Indian American American Indian Russian American American Indian Japanese Russian Heart DiseaseFluCancerHeart DiseaseViral InfectionFluCancerViral InfectionCancerHeart DiseaseViral InfectionViral InfectionCancerCancerFlu
Figure 1: Inpatient microdataNow you are asked to anonymize the above table according to the following requirements. Note that when you do the anonymization, you should try to generalize the QI withminimum changes (i.e., the changed values should be as accurate as possible).1. Generalize the QI values of the table for 2-anonymity.2. Generalize the QI values of the table for 4-anonymity.3. Generalize the QI values of the table for 3-diversity.4. Instead of generalize QI values, now you are asked to use the anatomy method todevelop the 3-diversity.2
Let’s block ads! (Why?)