An efficient algorithm for incremental privacy breach on (k, e)-anonymous model
Collaboration between business partners have become crucial these days. An important issue to be addressed is data privacy. In this paper, we address a problem of data privacy based on a prominent privacy model, (k, e)-Anonymous, when a new dataset is to be released, meanwhile there might be existin...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Published: |
2018
|
Subjects: | |
Online Access: | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84893299608&origin=inward http://cmuir.cmu.ac.th/jspui/handle/6653943832/52452 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Chiang Mai University |
id |
th-cmuir.6653943832-52452 |
---|---|
record_format |
dspace |
spelling |
th-cmuir.6653943832-524522018-09-04T09:25:28Z An efficient algorithm for incremental privacy breach on (k, e)-anonymous model Bowonsak Srisungsittisunti Juggapong Natwichai Computer Science Collaboration between business partners have become crucial these days. An important issue to be addressed is data privacy. In this paper, we address a problem of data privacy based on a prominent privacy model, (k, e)-Anonymous, when a new dataset is to be released, meanwhile there might be existing datasets released elsewhere. Since some attackers might obtain multiple versions of the datasets and compare them with the newly released dataset. Though, the privacy of all the datasets have been well-preserved individually, such comparison can lead to an privacy breach. We study the characteristics of the effects of multiple dataset releasing theoretically. It has been found that the privacy breach subjected to the increment occurs when there exists overlapping between any partition of the new dataset with any partition of any existing dataset. Based on our proposed studies, a polynomial-time algorithm is proposed. Not only it needs only considering one previous version of the dataset, it also can skip computing the overlapping partitions. Thus, the computational complexity of the proposed algorithm is only O(pn3) where p is the number of partitions and n is the number of tuples, meanwhile the privacy of all released datasets as well as the optimal solution can be always guaranteed. In addition, the experiments results, which can illustrate the efficiency of our algorithm, on the real-world dataset is presented. © 2013 IEEE. 2018-09-04T09:25:28Z 2018-09-04T09:25:28Z 2013-01-01 Conference Proceeding 2-s2.0-84893299608 10.1109/NBiS.2013.18 https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84893299608&origin=inward http://cmuir.cmu.ac.th/jspui/handle/6653943832/52452 |
institution |
Chiang Mai University |
building |
Chiang Mai University Library |
country |
Thailand |
collection |
CMU Intellectual Repository |
topic |
Computer Science |
spellingShingle |
Computer Science Bowonsak Srisungsittisunti Juggapong Natwichai An efficient algorithm for incremental privacy breach on (k, e)-anonymous model |
description |
Collaboration between business partners have become crucial these days. An important issue to be addressed is data privacy. In this paper, we address a problem of data privacy based on a prominent privacy model, (k, e)-Anonymous, when a new dataset is to be released, meanwhile there might be existing datasets released elsewhere. Since some attackers might obtain multiple versions of the datasets and compare them with the newly released dataset. Though, the privacy of all the datasets have been well-preserved individually, such comparison can lead to an privacy breach. We study the characteristics of the effects of multiple dataset releasing theoretically. It has been found that the privacy breach subjected to the increment occurs when there exists overlapping between any partition of the new dataset with any partition of any existing dataset. Based on our proposed studies, a polynomial-time algorithm is proposed. Not only it needs only considering one previous version of the dataset, it also can skip computing the overlapping partitions. Thus, the computational complexity of the proposed algorithm is only O(pn3) where p is the number of partitions and n is the number of tuples, meanwhile the privacy of all released datasets as well as the optimal solution can be always guaranteed. In addition, the experiments results, which can illustrate the efficiency of our algorithm, on the real-world dataset is presented. © 2013 IEEE. |
format |
Conference Proceeding |
author |
Bowonsak Srisungsittisunti Juggapong Natwichai |
author_facet |
Bowonsak Srisungsittisunti Juggapong Natwichai |
author_sort |
Bowonsak Srisungsittisunti |
title |
An efficient algorithm for incremental privacy breach on (k, e)-anonymous model |
title_short |
An efficient algorithm for incremental privacy breach on (k, e)-anonymous model |
title_full |
An efficient algorithm for incremental privacy breach on (k, e)-anonymous model |
title_fullStr |
An efficient algorithm for incremental privacy breach on (k, e)-anonymous model |
title_full_unstemmed |
An efficient algorithm for incremental privacy breach on (k, e)-anonymous model |
title_sort |
efficient algorithm for incremental privacy breach on (k, e)-anonymous model |
publishDate |
2018 |
url |
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84893299608&origin=inward http://cmuir.cmu.ac.th/jspui/handle/6653943832/52452 |
_version_ |
1681423953629806592 |