Managing dimensionality in data privacy anonymization

被引:16
|
作者
Zakerzadeh, Hessam [1 ]
Aggarwal, Charu C. [2 ]
Barker, Ken [1 ]
机构
[1] Univ Calgary, Calgary, AB, Canada
[2] IBM TJ Watson Res Ctr, Yorktown Hts, NY USA
关键词
High-dimensional anonymization; Privacy; k-Anonymity; l-Diversity; Vertical fragmentation;
D O I
10.1007/s10115-015-0906-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The curse of dimensionality has remained a challenge for a wide variety of algorithms in data mining, clustering, classification, and privacy. Recently, it was shown that an increasing dimensionality makes the data resistant to effective privacy. The theoretical results seem to suggest that the dimensionality curse is a fundamental barrier to privacy preservation. However, in practice, we show that some of the common properties of real data can be leveraged in order to greatly ameliorate the negative effects of the curse of dimensionality. In real data sets, many dimensions contain high levels of inter-attribute correlations. Such correlations enable the use of a process known as vertical fragmentation in order to decompose the data into vertical subsets of smaller dimensionality. An information-theoretic criterion of mutual information is used in the vertical decomposition process. This allows the use of an anonymization process, which is based on combining results from multiple independent fragments. We present a general approach, which can be applied to the k-anonymity, l-diversity, and t-closeness models. In the presence of inter-attribute correlations, such an approach continues to be much more robust in higher dimensionality, without losing accuracy. We present experimental results illustrating the effectiveness of the approach. This approach is resilient enough to prevent identity, attribute, and membership disclosure attack.
引用
收藏
页码:341 / 373
页数:33
相关论文
共 50 条
  • [41] Anonymization as homeomorphic data space transformation for privacy-preserving deep learning
    Girka, Anastasiia
    Terziyan, Vagan
    Gavriushenko, Mariia
    Gontarenko, Andrii
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INDUSTRY 4.0 AND SMART MANUFACTURING (ISM 2020), 2021, 180 : 867 - 876
  • [42] A Review of Anonymization for Healthcare Data
    Olatunji, Iyiola E.
    Rauch, Jens
    Katzensteiner, Matthias
    Khosla, Megha
    BIG DATA, 2022, : 538 - 555
  • [43] Alpha-anonymization techniques for privacy preservation in social networks
    Chakraborty, Saptarshi
    Tripathy, B. K.
    SOCIAL NETWORK ANALYSIS AND MINING, 2016, 6 (01)
  • [44] Privacy Preservation in Social networks through alpha - anonymization techniques
    Chakraborty, Saptarshi
    Tripathy, B. K.
    PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, : 1602 - 1603
  • [45] Precision Driven Privacy-Preserving Anonymization For Social Data Using Segmentation
    Monisha, R.
    Karthik, S.
    IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORK SECURITY (ICSNS 2018), 2018, : 416 - 420
  • [46] Optimizing data privacy: an RFD-based approach to anonymization strategy selection
    Sadeghi-Nasab, Alireza
    Rahmani, Mohsen
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01)
  • [47] Stipulation-Based Anonymization with Sensitivity Flags for Privacy Preserving Data Publishing
    Ashoka, K.
    Poornima, B.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 445 - 454
  • [48] An Architecture for Managing Data Privacy in Healthcare with Blockchain
    de Moraes Rossetto, Anubis Graciela
    Sega, Christofer
    Quietinho Leithardt, Valderi Reis
    SENSORS, 2022, 22 (21)
  • [49] Attribute-centric anonymization scheme for improving user privacy and utility of publishing e-health data
    Majeed, Abdul
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2019, 31 (04) : 426 - 435
  • [50] A Distributed Anonymization Scheme for Privacy-preserving Recommendation Systems
    Luo, Zhifeng
    Chen, Shuhong
    Li, Yutian
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 491 - 494