Publishing Microdata with a Robust Privacy Guarantee

被引:56
作者
Cao, Jianneng [1 ]
Karras, Panagiotis [2 ]
机构
[1] Natl Univ Singapore, Sch Comp, Singapore, Singapore
[2] Rutgers State Univ, Management Sci & Informat Syst, New Brunswick, NJ USA
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2012年 / 5卷 / 11期
关键词
D O I
10.14778/2350229.2350255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, the publication of microdata poses a privacy threat. Vast research has striven to define the privacy condition that microdata should satisfy before it is released, and devise algorithms to anonymize the data so as to achieve this condition. Yet, no method proposed to date explicitly bounds the percentage of information an adversary gains after seeing the published data for each sensitive value therein. This paper introduces beta-likeness, an appropriately robust privacy model for microdata anonymization, along with two anonymization schemes designed therefor, the one based on generalization, and the other based on perturbation. Our model postulates that an adversary's confidence on the likelihood of a certain sensitive-attribute (SA) value should not increase, in relative difference terms, by more than a predefined threshold. Our techniques aim to satisfy a given beta threshold with little information loss. We experimentally demonstrate that (i) our model provides an effective privacy guarantee in a way that predecessor models cannot, (ii) our generalization scheme is more effective and efficient in its task than methods adapting algorithms for the k-anonymity model, and (iii) our perturbation method outperforms a baseline approach. Moreover, we discuss in detail the resistance of our model and methods to attacks proposed in previous research.
引用
收藏
页码:1388 / 1399
页数:12
相关论文
共 32 条
[1]  
Agrawal S, 2005, PROC INT CONF DATA, P193
[2]  
Brickell J., 2008, P 14 ACM SIGKDD INT, P70, DOI DOI 10.1145/1401890.1401904
[3]   SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness [J].
Cao, Jianneng ;
Karras, Panagiotis ;
Kalnis, Panos ;
Tan, Kian-Lee .
VLDB JOURNAL, 2011, 20 (01) :59-81
[4]  
Chaytor R, 2010, PROC VLDB ENDOW, V3, P608
[5]  
Cormode G., 2011, PROC 17 ACM SIGKDD I, P1253
[6]   Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data [J].
Cormode, Graham ;
Srivastava, Divesh ;
Li, Ninghui ;
Li, Tiancheng .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2010, 3 (01) :1045-1056
[7]   Indexing high-dimensional data for efficient in-memory similarity search [J].
Cui, B ;
Ooi, BC ;
Su, JW ;
Tan, KL .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (03) :339-353
[8]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[9]  
Evfimievski A., 2003, PROC 22 ACM SIGMOD S, P211, DOI DOI 10.1145/773153.773174
[10]  
Ganta Srivatsava Ranjit, 2008, SER KDD 08, P265, DOI DOI 10.1145/1401890.1401926