Data utility and privacy protection in data publishing

作者: Grigorios Loukides

DOI:

关键词:

摘要: Data about individuals is being increasingly collected and disseminated for purposes such as business analysis medical research. This has raised some privacy concerns. In response, a number of techniques have been proposed which attempt to transform data prior its release so that sensitive information the contained within it protected. A:-Anonymisation one technique attracted much recent attention from database research community. works by transforming in way each record made identical at least A: 1 other records with respect those attributes are likely be used identify individuals. helps prevent associated disclosed, individual represented dataset. Ideally, /c-anonymised dataset should maximise both utility protection, i.e. allow intended analytic tasks carried out without loss accuracy while preventing disclosure, but these two notions conflicting only trade-off between them can achieved practice. The existing works, however, focus on how either or protection requirement may satisfied, often result anonymised an unnecessarily and/or unacceptably low level protection. this thesis, we study construct /-anonymous satisfies requirements. We propose new criteria capture requirements, algorithms A:-anonymisations required utility/protection guarantees generated. Our extensive experiments using benchmarking synthetic datasets show our methods efficient, produce A:-anonymised desired properties, outperform state art retaining providing

参考文章(96)
Carlos A. Coello Coello, Gary B. Lamont, David A. Van Veldhuizen, Evolutionary Algorithms for Solving Multi-Objective Problems (Genetic and Evolutionary Computation) Springer-Verlag New York, Inc.. ,(2006)
Rina Panigrahy, Rajeev Motwani, Krishnaram Kenthapadi, Dilys Thomas, Tomas Feder, Gagan Aggarwal, An Zhu, Approximation Algorithms for k-Anonymity Journal of Privacy Technology. ,(2005)
Alan F. Westin, Privacy and freedom ,(1970)
Deborah Russell, Simson Garfinkel, PGP: Pretty Good Privacy ,(1994)
Ramakrishnan Srikant, Rakesh Agrawal, Fast Algorithms for Mining Association Rules in Large Databases very large data bases. pp. 487- 499 ,(1994)
E. T. Jaynes, Probability theory : the logic of science The Mathematical Intelligencer. ,vol. 27, pp. 83- 83 ,(2003) , 10.1017/CBO9780511790423
Charu C. Aggarwal, Philip S. Yu, A Condensation Approach to Privacy Preserving Data Mining extending database technology. pp. 183- 199 ,(2004) , 10.1007/978-3-540-24741-8_12
Vladimir Filkov, Steven Skiena, Heterogeneous Data Integration with the Consensus Clustering Formalism Lecture Notes in Computer Science. pp. 110- 123 ,(2004) , 10.1007/978-3-540-24745-6_8
Charu C. Aggarwal, On k -anonymity and the curse of dimensionality very large data bases. pp. 901- 909 ,(2005)
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, The Role of Quasi-identifiers in k-Anonymity Revisited arXiv: Databases. ,(2006)