Exposing safe correlations in transactional datasets

被引:1
作者
Chicha, Elie [1 ,2 ]
Al Bouna, Bechara [2 ]
Wunsche, Kay [3 ]
Chbeir, Richard [1 ]
机构
[1] Univ Pau & Pays Adour, LIUPPA, E2S UPPA, Anglet, France
[2] Antonine Univ, TICKET Lab, Hadat Baabda, Lebanon
[3] Tech Univ Dresden, Dresden, Germany
关键词
DIFFERENTIAL PRIVACY;
D O I
10.1007/s11761-021-00325-1
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A particularly challenging problem for data anonymization is dealing with transactional data. Most anonymization methods assume homogeneous, independent and identically distributed (i.i.d.) data; "flattening" transactional data to satisfy this model results in wide, sparse data that does not anonymize well with traditional techniques. While there have been some approaches for generalization-based anonymization, bucketization techniques (e.g., anatomy) pose new challenges. In particular, bucketization provides the opportunity to learn correlations between data items, but also a risk of identifying individuals because of dependencies inferred from such correlations. We present a method that balances these issues, retaining the ability to discover correlations in the data, while hiding dependencies that would enable correlations to be used to link specific values to individuals. We introduce a correlation anonymization constraint that ensures correlations do not allow data to be linked to a specific individual, and an elastic safe grouping algorithm that meets this constraint while preserving data correlations. We evaluate the utility loss on a transactional rental dataset.
引用
收藏
页码:289 / 307
页数:19
相关论文
共 46 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Al Bouna B, 2013, LECT NOTES COMPUT SC, V7964, P164, DOI 10.1007/978-3-642-39256-6_11
[3]  
Aldous D. J., 1985, Ecole d'Ete de Probabilites de Saint-Flour XIII-1983, P1
[4]   Bottom-up sequential anonymization in the presence of adversary knowledge [J].
Amiri, Fatemeh ;
Yazdani, Nasser ;
Shakery, Azadeh .
INFORMATION SCIENCES, 2018, 450 :316-335
[5]  
Andres Miguel E., 2013, ACM C COMP COMM SEC, P901
[6]  
Anjum A, 2017, COMPUTERS, V6, DOI 10.3390/computers6010001
[7]  
Biskup J, 2011, LECT NOTES COMPUT SC, V7001, P246, DOI 10.1007/978-3-642-24861-0_17
[8]  
Bouna BA, 2015, P WORKSHOPS EDBTICDT, P278
[9]   Anonymizing transactional datasets [J].
Bouna, Bechara A. L. ;
Clifton, Chris ;
Malluhi, Qutaibah .
JOURNAL OF COMPUTER SECURITY, 2015, 23 (01) :89-106
[10]  
Centers for Medicare & Medicaid Services, 1996, HLTH INS PORT ACC AC