Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data

被引:28
作者
Cormode, Graham [1 ]
Srivastava, Divesh [1 ]
Li, Ninghui [2 ]
Li, Tiancheng [2 ]
机构
[1] AT&T Labs Res, Florham Pk, NJ 07932 USA
[2] Purdue Univ, W Lafayette, IN 47907 USA
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2010年 / 3卷 / 01期
关键词
D O I
10.14778/1920841.1920972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The principle of anonymization for data sharing has become a very popular paradigm for the preservation of privacy of the data subjects. Since the introduction of k-anonymity, dozens of methods and enhanced privacy definitions have been proposed. However, over-eager attempts to minimize the information lost by the anonymization potentially allow private information to be inferred. Proof-of-concept of this "minimality attack" has been demonstrated for a variety of algorithms and definitions [16]. In this paper, we provide a comprehensive analysis and study of this attack, and demonstrate that with care its effect can be almost entirely countered. The attack allows an adversary to increase his (probabilistic) belief in certain facts about individuals over the data. We show that (a) a large class of algorithms are not affected by this attack, (b) for a class of algorithms that have a "symmetric" property, the attacker's belief increases by at most a small constant, and (c) even for an algorithm chosen to be highly susceptible to the attack, the attacker's belief when using the attack increases by at most a small constant factor. We also provide a series of experiments that show in all these cases that the confidence about the sensitive value of any individual remains low in practice, while the published data is still useful for its intended purpose. From this, we conclude that the impact of such method-based attacks can be minimized.
引用
收藏
页码:1045 / 1056
页数:12
相关论文
共 22 条
  • [1] Aggarwal G, 2005, LECT NOTES COMPUT SC, V3363, P246
  • [2] Asuncion A., 2007, UCI ML REPOSITORY
  • [3] Cormode G., 2009, SIGMOD
  • [4] Fung BCM, 2005, PROC INT CONF DATA, P205
  • [5] Gehrke J., 2009, PRIVACY DATA PUBLISH
  • [6] Kifer D., 2009, SIGMOD
  • [7] LeFevre K., 2005, SIGMOD, P49, DOI DOI 10.1145/1066157.1066164
  • [8] LeFevre Kristen, 2006, PROC 22 INT C DATA E, P25, DOI DOI 10.1109/ICDE.2006.101
  • [9] Li N., 2008, ICDE
  • [10] On-chip continuous blood cell sub-type separation by deterministic lateral displacement
    Li, Nan
    Kamei, Daniel T.
    Ho, Chili-Ming
    [J]. 2007 2ND IEEE INTERNATIONAL CONFERENCE ON NANO/MICRO ENGINEERED AND MOLECULAR SYSTEMS, VOLS 1-3, 2007, : 692 - +