Flash: Efficient, Stable and Optimal K-Anonymity

被引:54
作者
Kohlmayer, Florian [1 ,2 ]
Prasser, Fabian [1 ,2 ]
Eckert, Claudia [1 ]
Kemper, Alfons [1 ]
Kuhn, Klaus A. [2 ]
机构
[1] Tech Univ Munich, Dept Comp Sci, D-85748 Garching, Germany
[2] Tech Univ Munich, Klinikum Rechts Isar, Univ Med Ctr, D-81675 Munich, Germany
来源
PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012) | 2012年
关键词
D O I
10.1109/SocialCom-PASSAT.2012.52
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
K-anonymization is an important technique for the de-identification of sensitive datasets. In this paper, we briefly describe an implementation framework which has been carefully engineered to meet the needs of an important class of k-anonymity algorithms. We have implemented and evaluated two major well-known algorithms within this framework and show that it allows for highly efficient implementations. Regarding their runtime behaviour, we were able to closely reproduce the results from previous publications but also found some algorithmic limitations. Furthermore, we propose a new algorithm that achieves very good performance by implementing a novel strategy and exploiting different aspects of our implementation framework. In contrast to the current state-of-the-art, our algorithm offers algorithmic stability, with execution time being independent of the actual representation of the input data. Experiments with different real-world datasets show that our solution clearly outperforms the previous algorithms.
引用
收藏
页码:708 / 717
页数:10
相关论文
共 25 条
[1]  
AGGARWAL G, 2005, P INT C DAT THEOR
[2]   Achieving Anonymity via Clustering [J].
Aggarwal, Gagan ;
Feder, Tomas ;
Kenthapadi, Krishnaram ;
Khuller, Samir ;
Panigrahy, Rina ;
Thomas, Dilys ;
Zhu, An .
ACM TRANSACTIONS ON ALGORITHMS, 2010, 6 (03)
[3]  
[Anonymous], 2005, P 2005 ACM SIGMOD IN
[4]  
Bayardo RJ, 2005, PROC INT CONF DATA, P217
[5]  
Ciriani V, 2008, ADV DATABASE SYST, V34, P105
[6]  
Dankar F. K., 2012, EDBT ICDT WORKSH 5 I
[7]  
De Waal A., 1999, NETHERLANDS OFFICIAL, V14, P17
[8]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[9]   Risk-Based De-Identification of Health Data [J].
El Emam, Khaled .
IEEE SECURITY & PRIVACY, 2010, 8 (03) :64-67
[10]   A Globally Optimal k-Anonymity Method for the De-Identification of Health Data [J].
El Emam, Khaled ;
Dankar, Fida Kamal ;
Issa, Romeo ;
Jonker, Elizabeth ;
Amyot, Daniel ;
Cogo, Elise ;
Corriveau, Jean-Pierre ;
Walker, Mark ;
Chowdhury, Sadrul ;
Vaillancourt, Regis ;
Roffey, Tyson ;
Bottomley, Jim .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2009, 16 (05) :670-682