Privacy-preserving distributed k-anonymity

被引:0
作者
Jiang, W [1 ]
Clifton, C [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
来源
DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS | 2005年 / 3654卷
关键词
k-anonymity; privacy; security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous data, the model has been that of a single source wanting to publish data. This paper presents a k-anonymity protocol when the data is vertically partitioned between sites. A key contribution is a proof that the protocol preserves k-anonymity between the sites: While one site may have individually identifiable data, it learns nothing that violates k-anonymity with respect to the data at the other site. This is a fundamentally different distributed privacy definition than that of Secure Multiparty Computation, and it provides a better match with both ethical and legal views of privacy.
引用
收藏
页码:166 / 177
页数:12
相关论文
共 50 条
  • [21] ℓ-diversity: Privacy beyond k-anonymity
    Cornell University
    不详
    ACM Trans. Knowl. Discov. Data, 2007, 1
  • [22] Distribution-preserving k-anonymity
    Wei, Dennis
    Ramamurthy, Karthikeyan Natesan
    Varshney, Kush R.
    STATISTICAL ANALYSIS AND DATA MINING, 2018, 11 (06) : 253 - 270
  • [23] k-anonymity:: A model for protecting privacy
    Sweeney, L
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570
  • [24] A Coalitional Game Theoretic Mechanism for Privacy Preserving Publishing Based on k-Anonymity
    Chakravarthy, Srinivasa L.
    Kumari, Valli V.
    Sarojini, Ch
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 889 - 896
  • [25] A secure distributed framework for achieving k-anonymity
    Wei Jiang
    Chris Clifton
    The VLDB Journal, 2006, 15 : 316 - 333
  • [26] Privacy in statistical databases:: K-anonymity through microaggregation
    Domingo-Ferrer, Josep
    Solanas, Agusti
    Martinez-Balleste, Antoni
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 774 - +
  • [27] Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions
    Qian, Jin
    Jiang, Haoying
    Yu, Ying
    Wang, Hui
    Miao, Duoqian
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 239
  • [28] Data privacy preservation algorithm with k-anonymity
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05): : 1551 - 1561
  • [29] Methods for Privacy Protection Using K-Anonymity
    Sharma, Vijay
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
  • [30] Medical Ethics Privacy Protection Based on Combining Distributed Randomization With K-anonymity
    Xie, Yonghong
    He, Qing
    Zhang, Dezheng
    Hu, Xiaojing
    2015 8th International Congress on Image and Signal Processing (CISP), 2015, : 1577 - 1582