k-Anonymity in the Presence of External Databases

The concept of k-anonymity has received considerable attention due to the need of several organizations to release microdata without revealing the identity of individuals. Although all previous k-anonymity techniques assume the existence of a public database (PD) that can be used to breach privacy,...

Full description

Saved in:
Bibliographic Details
Main Authors: SACHARIDIS, Dimitris, MOURATIDIS, Kyriakos, Papadias, Dimitris
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2010
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/816
https://ink.library.smu.edu.sg/context/sis_research/article/1815/viewcontent/TKDE10_JoinAnonymity.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1815
record_format dspace
spelling sg-smu-ink.sis_research-18152016-04-29T04:06:41Z k-Anonymity in the Presence of External Databases SACHARIDIS, Dimitris MOURATIDIS, Kyriakos Papadias, Dimitris The concept of k-anonymity has received considerable attention due to the need of several organizations to release microdata without revealing the identity of individuals. Although all previous k-anonymity techniques assume the existence of a public database (PD) that can be used to breach privacy, none utilizes PD during the anonymization process. Specifically, existing generalization algorithms create anonymous tables using only the microdata table (MT) to be published, independently of the external knowledge available. This omission leads to high information loss. Motivated by this observation we first introduce the concept of k-join-anonymity (KJA), which permits more effective generalization to reduce the information loss. Briefly, KJA anonymizes a superset of MT, which includes selected records from PD. We propose two methodologies for adapting k-anonymity algorithms to their KJA counterparts. The first generalizes the combination of MT and PD, under the constraint that each group should contain at least one tuple of MT (otherwise, the group is useless and discarded). The second anonymizes MT, and then refines the resulting groups using PD. Finally, we evaluate the effectiveness of our contributions with an extensive experimental evaluation using real and synthetic datasets. 2010-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/816 info:doi/10.1109/TKDE.2009.120 https://ink.library.smu.edu.sg/context/sis_research/article/1815/viewcontent/TKDE10_JoinAnonymity.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Privacy k-anonymity Databases and Information Systems Numerical Analysis and Scientific Computing Theory and Algorithms
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Privacy
k-anonymity
Databases and Information Systems
Numerical Analysis and Scientific Computing
Theory and Algorithms
spellingShingle Privacy
k-anonymity
Databases and Information Systems
Numerical Analysis and Scientific Computing
Theory and Algorithms
SACHARIDIS, Dimitris
MOURATIDIS, Kyriakos
Papadias, Dimitris
k-Anonymity in the Presence of External Databases
description The concept of k-anonymity has received considerable attention due to the need of several organizations to release microdata without revealing the identity of individuals. Although all previous k-anonymity techniques assume the existence of a public database (PD) that can be used to breach privacy, none utilizes PD during the anonymization process. Specifically, existing generalization algorithms create anonymous tables using only the microdata table (MT) to be published, independently of the external knowledge available. This omission leads to high information loss. Motivated by this observation we first introduce the concept of k-join-anonymity (KJA), which permits more effective generalization to reduce the information loss. Briefly, KJA anonymizes a superset of MT, which includes selected records from PD. We propose two methodologies for adapting k-anonymity algorithms to their KJA counterparts. The first generalizes the combination of MT and PD, under the constraint that each group should contain at least one tuple of MT (otherwise, the group is useless and discarded). The second anonymizes MT, and then refines the resulting groups using PD. Finally, we evaluate the effectiveness of our contributions with an extensive experimental evaluation using real and synthetic datasets.
format text
author SACHARIDIS, Dimitris
MOURATIDIS, Kyriakos
Papadias, Dimitris
author_facet SACHARIDIS, Dimitris
MOURATIDIS, Kyriakos
Papadias, Dimitris
author_sort SACHARIDIS, Dimitris
title k-Anonymity in the Presence of External Databases
title_short k-Anonymity in the Presence of External Databases
title_full k-Anonymity in the Presence of External Databases
title_fullStr k-Anonymity in the Presence of External Databases
title_full_unstemmed k-Anonymity in the Presence of External Databases
title_sort k-anonymity in the presence of external databases
publisher Institutional Knowledge at Singapore Management University
publishDate 2010
url https://ink.library.smu.edu.sg/sis_research/816
https://ink.library.smu.edu.sg/context/sis_research/article/1815/viewcontent/TKDE10_JoinAnonymity.pdf
_version_ 1770570726433095680