k-Anonymity in the Presence of External Databases
The concept of k-anonymity has received considerable attention due to the need of several organizations to release microdata without revealing the identity of individuals. Although all previous k-anonymity techniques assume the existence of a public database (PD) that can be used to breach privacy,...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2010
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/816 https://ink.library.smu.edu.sg/context/sis_research/article/1815/viewcontent/TKDE10_JoinAnonymity.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-1815 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-18152016-04-29T04:06:41Z k-Anonymity in the Presence of External Databases SACHARIDIS, Dimitris MOURATIDIS, Kyriakos Papadias, Dimitris The concept of k-anonymity has received considerable attention due to the need of several organizations to release microdata without revealing the identity of individuals. Although all previous k-anonymity techniques assume the existence of a public database (PD) that can be used to breach privacy, none utilizes PD during the anonymization process. Specifically, existing generalization algorithms create anonymous tables using only the microdata table (MT) to be published, independently of the external knowledge available. This omission leads to high information loss. Motivated by this observation we first introduce the concept of k-join-anonymity (KJA), which permits more effective generalization to reduce the information loss. Briefly, KJA anonymizes a superset of MT, which includes selected records from PD. We propose two methodologies for adapting k-anonymity algorithms to their KJA counterparts. The first generalizes the combination of MT and PD, under the constraint that each group should contain at least one tuple of MT (otherwise, the group is useless and discarded). The second anonymizes MT, and then refines the resulting groups using PD. Finally, we evaluate the effectiveness of our contributions with an extensive experimental evaluation using real and synthetic datasets. 2010-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/816 info:doi/10.1109/TKDE.2009.120 https://ink.library.smu.edu.sg/context/sis_research/article/1815/viewcontent/TKDE10_JoinAnonymity.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Privacy k-anonymity Databases and Information Systems Numerical Analysis and Scientific Computing Theory and Algorithms |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Privacy k-anonymity Databases and Information Systems Numerical Analysis and Scientific Computing Theory and Algorithms |
spellingShingle |
Privacy k-anonymity Databases and Information Systems Numerical Analysis and Scientific Computing Theory and Algorithms SACHARIDIS, Dimitris MOURATIDIS, Kyriakos Papadias, Dimitris k-Anonymity in the Presence of External Databases |
description |
The concept of k-anonymity has received considerable attention due to the need of several organizations to release microdata without revealing the identity of individuals. Although all previous k-anonymity techniques assume the existence of a public database (PD) that can be used to breach privacy, none utilizes PD during the anonymization process. Specifically, existing generalization algorithms create anonymous tables using only the microdata table (MT) to be published, independently of the external knowledge available. This omission leads to high information loss. Motivated by this observation we first introduce the concept of k-join-anonymity (KJA), which permits more effective generalization to reduce the information loss. Briefly, KJA anonymizes a superset of MT, which includes selected records from PD. We propose two methodologies for adapting k-anonymity algorithms to their KJA counterparts. The first generalizes the combination of MT and PD, under the constraint that each group should contain at least one tuple of MT (otherwise, the group is useless and discarded). The second anonymizes MT, and then refines the resulting groups using PD. Finally, we evaluate the effectiveness of our contributions with an extensive experimental evaluation using real and synthetic datasets. |
format |
text |
author |
SACHARIDIS, Dimitris MOURATIDIS, Kyriakos Papadias, Dimitris |
author_facet |
SACHARIDIS, Dimitris MOURATIDIS, Kyriakos Papadias, Dimitris |
author_sort |
SACHARIDIS, Dimitris |
title |
k-Anonymity in the Presence of External Databases |
title_short |
k-Anonymity in the Presence of External Databases |
title_full |
k-Anonymity in the Presence of External Databases |
title_fullStr |
k-Anonymity in the Presence of External Databases |
title_full_unstemmed |
k-Anonymity in the Presence of External Databases |
title_sort |
k-anonymity in the presence of external databases |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2010 |
url |
https://ink.library.smu.edu.sg/sis_research/816 https://ink.library.smu.edu.sg/context/sis_research/article/1815/viewcontent/TKDE10_JoinAnonymity.pdf |
_version_ |
1770570726433095680 |