Privacy-preserving distributed k-anonymity

被引:0
作者
Jiang, W [1 ]
Clifton, C [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
来源
DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS | 2005年 / 3654卷
关键词
k-anonymity; privacy; security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous data, the model has been that of a single source wanting to publish data. This paper presents a k-anonymity protocol when the data is vertically partitioned between sites. A key contribution is a proof that the protocol preserves k-anonymity between the sites: While one site may have individually identifiable data, it learns nothing that violates k-anonymity with respect to the data at the other site. This is a fundamentally different distributed privacy definition than that of Secure Multiparty Computation, and it provides a better match with both ethical and legal views of privacy.
引用
收藏
页码:166 / 177
页数:12
相关论文
共 50 条
  • [31] A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
    Sowmiya, B.
    Poovammal, E.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1359 - 1376
  • [32] A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
    B. Sowmiya
    E. Poovammal
    Wireless Personal Communications, 2022, 127 : 1359 - 1376
  • [33] Personalized extended (α, k)-anonymity model for privacy-preserving data publishing
    Liu, Xiangwen
    Xie, Qingqing
    Wang, Liangmin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (06)
  • [34] Multirelational k-Anonymity
    Nergiz, Mehmet Ercan
    Clifton, Christopher
    Nergiz, Ahmet Erhan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (08) : 1104 - 1117
  • [35] Hybrid k-Anonymity
    Nergiz, Mehmet Ercan
    Gok, Muhammed Zahit
    COMPUTERS & SECURITY, 2014, 44 : 51 - 63
  • [36] Privacy Preserving for Spatio-Temporal Data Publishing Ensuring Location Diversity Using K-Anonymity Technique
    Avaghade, Sachin B.
    Patil, Sachin S.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [37] Privacy Preserving for Spatio-Temporal Data Publishing Ensuring Location Diversity Using K-Anonymity Technique
    Avaghade, Sachin B.
    Patil, Sachin S.
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [38] A Clustering K-Anonymity Scheme for Location Privacy Preservation
    Yao, Lin
    Wu, Guowei
    Wang, Jia
    Xia, Feng
    Lin, Chi
    Wang, Guojun
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 134 - 142
  • [39] k-Anonymity Location Privacy Algorithm Based on Clustering
    Zheng, Lijuan
    Yue, Huanhuan
    Li, Zhaoxuan
    Pan, Xiao
    Wu, Mei
    Yang, Fan
    IEEE ACCESS, 2018, 6 : 28328 - 28338
  • [40] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490