Weak k-anonymity:: A low-distortion model for protecting privacy

被引:0
|
作者
Atzori, Maurizio
机构
[1] Univ Pisa, CS Dept, I-56127 Pisa, Italy
[2] CNR, KDD Lab, ISTI, CNR, I-56124 Pisa, Italy
来源
INFORMATION SECURITY, PROCEEDINGS | 2006年 / 4176卷
关键词
data privacy; k-anonymity; low distortion;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sharing microdata tables is a primary concern in today information society. Privacy issues can be an obstacle to the free flow of such information. In recent years, disclosure control techniques have been developed to modify microdata tables in order to be anonymous. The k-anonymity framework has been widely adopted as a standard technique to remove links between public available identifiers (such as full names) and sensitive data contained in the shared tables. In this paper we give a weaker definition of k-anonymity, allowing lower distortion on the anonymized data. We show that, under the hypothesis in which the adversary is not sure a priori about the presence of a person in the table, the privacy properties of k-anonymity are respected also in the weak k-anonymity framework. Experiments on real-world data show that our. approach outperforms k-anonymity in terms of distortion introduced in the released data by the algorithms to enforce anonymity.
引用
收藏
页码:60 / 71
页数:12
相关论文
共 50 条
  • [1] k-anonymity:: A model for protecting privacy
    Sweeney, L
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570
  • [2] Protecting privacy using k-anonymity
    El Emam, Khaled
    Dankar, Fida Kamal
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) : 627 - 637
  • [3] A K-anonymity Based Semantic Model For Protecting Personal Information and Privacy
    Omran, Esraa
    Bokma, Albert
    Abu-Almaati, Shereef
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1443 - +
  • [4] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18
  • [5] Multidimensional k-anonymity for Protecting Privacy using Nearest Neighborhood Strategy
    Patil, B. B.
    Patankar, A. J.
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 532 - 535
  • [6] Risk & distortion based K-anonymity
    Xu, Shenkun
    Ye, Xiaojun
    INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 345 - 358
  • [7] -diversity: Privacy beyond k-anonymity
    Cornell University
    不详
    ACM Trans. Knowl. Discov. Data, 2007, 1
  • [8] An Adaptive Learning Model for k-Anonymity Location Privacy Protection
    Natesan, Gayathri
    Liu, Jigang
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16
  • [9] Protecting query privacy with differentially private k-anonymity in location-based services
    Jinbao Wang
    Zhipeng Cai
    Yingshu Li
    Donghua Yang
    Ji Li
    Hong Gao
    Personal and Ubiquitous Computing, 2018, 22 : 453 - 469
  • [10] Protecting query privacy with differentially private k-anonymity in location-based services
    Wang, Jinbao
    Cai, Zhipeng
    Li, Yingshu
    Yang, Donghua
    Li, Ji
    Gao, Hong
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (03) : 453 - 469