Privacy-Preserving Publishing of Hierarchical Data

被引:10
作者
Ozalp, Ismet [1 ]
Gursoy, Mehmet Emre [2 ]
Nergiz, Mehmet Ercan [3 ]
Saygin, Yucel [1 ]
机构
[1] Sabanci Univ, Fac Engn & Nat Sci, TR-34956 Istanbul, Turkey
[2] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
[3] Acadsoft Res, Kucukkizilhisar Mah Gaziantep Teknopk, Gaziantep, Turkey
关键词
Security; Algorithms; Experimentation; Data privacy; anonymity; data publishing; k-anonymity; hierarchical data; complex data; XML; ANONYMIZATION; ASSIGNMENT; DEPENDENCY; DIVERSITY;
D O I
10.1145/2976738
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many applications today rely on storage and management of semi-structured information, for example, XML databases and document-oriented databases. These data often have to be shared with untrusted third parties, which makes individuals' privacy a fundamental problem. In this article, we propose anonymization techniques for privacy-preserving publishing of hierarchical data. We show that the problem of anonymizing hierarchical data poses unique challenges that cannot be readily solved by existing mechanisms. We extend two standards for privacy protection in tabular data (k-anonymity and l-diversity) and apply them to hierarchical data. We present utility-aware algorithms that enforce these definitions of privacy using generalizations and suppressions of data values. To evaluate our algorithms and their heuristics, we experiment on synthetic and real datasets obtained from two universities. Our experiments show that we significantly outperform related methods that provide comparable privacy guarantees.
引用
收藏
页数:29
相关论文
共 46 条
[1]  
[Anonymous], 2006, P 32 INT C VER LARG
[2]  
[Anonymous], 2006, 22 INT C DAT ENG WOR, DOI DOI 10.1109/ICDEW.2006.116
[3]  
[Anonymous], 2005, P 2005 ACM SIGMOD IN
[4]  
[Anonymous], 2010, Computing, DOI DOI 10.1145/1749603.1749605
[5]  
[Anonymous], 2008, Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data
[6]  
[Anonymous], 2008, SIGKDD Explorations, DOI DOI 10.1145/1540276.1540279
[7]  
Bayardo RJ, 2005, PROC INT CONF DATA, P217
[8]   Specifying and enforcing access control policies for XML document sources [J].
Bertino E. ;
Castano S. ;
Ferrari E. ;
Mesiti M. .
World Wide Web, 2000, 3 (03) :139-151
[9]  
Bertino E, 2008, ADV DATABASE SYST, V34, P183
[10]  
Cheng J., 2010, P 2010 ACM SIGMOD IN, P459, DOI DOI 10.1145/1807167.1807218