An efficient algorithm for incremental privacy breach on (k, e)-anonymous model

Collaboration between business partners have become crucial these days. An important issue to be addressed is data privacy. In this paper, we address a problem of data privacy based on a prominent privacy model, (k, e)-Anonymous, when a new dataset is to be released, meanwhile there might be existin...

Full description

Saved in:
Bibliographic Details
Main Authors: Bowonsak Srisungsittisunti, Juggapong Natwichai
Format: Conference Proceeding
Published: 2018
Online Access:https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84893299608&origin=inward
http://cmuir.cmu.ac.th/jspui/handle/6653943832/48192
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Chiang Mai University
id th-cmuir.6653943832-48192
record_format dspace
spelling th-cmuir.6653943832-481922018-04-25T08:48:48Z An efficient algorithm for incremental privacy breach on (k, e)-anonymous model Bowonsak Srisungsittisunti Juggapong Natwichai Collaboration between business partners have become crucial these days. An important issue to be addressed is data privacy. In this paper, we address a problem of data privacy based on a prominent privacy model, (k, e)-Anonymous, when a new dataset is to be released, meanwhile there might be existing datasets released elsewhere. Since some attackers might obtain multiple versions of the datasets and compare them with the newly released dataset. Though, the privacy of all the datasets have been well-preserved individually, such comparison can lead to an privacy breach. We study the characteristics of the effects of multiple dataset releasing theoretically. It has been found that the privacy breach subjected to the increment occurs when there exists overlapping between any partition of the new dataset with any partition of any existing dataset. Based on our proposed studies, a polynomial-time algorithm is proposed. Not only it needs only considering one previous version of the dataset, it also can skip computing the overlapping partitions. Thus, the computational complexity of the proposed algorithm is only O(pn 3 ) where p is the number of partitions and n is the number of tuples, meanwhile the privacy of all released datasets as well as the optimal solution can be always guaranteed. In addition, the experiments results, which can illustrate the efficiency of our algorithm, on the real-world dataset is presented. © 2013 IEEE. 2018-04-25T08:48:48Z 2018-04-25T08:48:48Z 2013-01-01 Conference Proceeding 2-s2.0-84893299608 10.1109/NBiS.2013.18 https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84893299608&origin=inward http://cmuir.cmu.ac.th/jspui/handle/6653943832/48192
institution Chiang Mai University
building Chiang Mai University Library
country Thailand
collection CMU Intellectual Repository
description Collaboration between business partners have become crucial these days. An important issue to be addressed is data privacy. In this paper, we address a problem of data privacy based on a prominent privacy model, (k, e)-Anonymous, when a new dataset is to be released, meanwhile there might be existing datasets released elsewhere. Since some attackers might obtain multiple versions of the datasets and compare them with the newly released dataset. Though, the privacy of all the datasets have been well-preserved individually, such comparison can lead to an privacy breach. We study the characteristics of the effects of multiple dataset releasing theoretically. It has been found that the privacy breach subjected to the increment occurs when there exists overlapping between any partition of the new dataset with any partition of any existing dataset. Based on our proposed studies, a polynomial-time algorithm is proposed. Not only it needs only considering one previous version of the dataset, it also can skip computing the overlapping partitions. Thus, the computational complexity of the proposed algorithm is only O(pn 3 ) where p is the number of partitions and n is the number of tuples, meanwhile the privacy of all released datasets as well as the optimal solution can be always guaranteed. In addition, the experiments results, which can illustrate the efficiency of our algorithm, on the real-world dataset is presented. © 2013 IEEE.
format Conference Proceeding
author Bowonsak Srisungsittisunti
Juggapong Natwichai
spellingShingle Bowonsak Srisungsittisunti
Juggapong Natwichai
An efficient algorithm for incremental privacy breach on (k, e)-anonymous model
author_facet Bowonsak Srisungsittisunti
Juggapong Natwichai
author_sort Bowonsak Srisungsittisunti
title An efficient algorithm for incremental privacy breach on (k, e)-anonymous model
title_short An efficient algorithm for incremental privacy breach on (k, e)-anonymous model
title_full An efficient algorithm for incremental privacy breach on (k, e)-anonymous model
title_fullStr An efficient algorithm for incremental privacy breach on (k, e)-anonymous model
title_full_unstemmed An efficient algorithm for incremental privacy breach on (k, e)-anonymous model
title_sort efficient algorithm for incremental privacy breach on (k, e)-anonymous model
publishDate 2018
url https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84893299608&origin=inward
http://cmuir.cmu.ac.th/jspui/handle/6653943832/48192
_version_ 1681423203875946496