[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1247480.1247556acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article

M-invariance: towards privacy preserving re-publication of dynamic datasets

Published: 11 June 2007 Publication History

Abstract

The previous literature of privacy preserving data publication has focused on performing "one-time" releases. Specifically, none of the existing solutions supports re-publication of the microdata, after it has been updated with insertions <u>and</u> deletions. This is a serious drawback, because currently a publisher cannot provide researchers with the most recent dataset continuously.
This paper remedies the drawback. First, we reveal the characteristics of the re-publication problem that invalidate the conventional approaches leveraging k-anonymity and l-diversity. Based on rigorous theoretical analysis, we develop a new generalization principle m-invariance that effectively limits the risk of privacy disclosure in re-publication. We accompany the principle with an algorithm, which computes privacy-guarded relations that permit retrieval of accurate aggregate information about the original microdata. Our theoretical results are confirmed by extensive experiments with real data.

References

[1]
C. C. Aggarwal. On k-anonymity and the curse of dimensionality. In VLDB, pages 901--909, 2005.
[2]
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In PODS, pages 153--162, 2006.
[3]
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In ICDT, pages 246--258, 2005.
[4]
F. Bacchus, A. J. Grove, J. Y. Halpern, and D. Koller. From statistical knowledge bases to degrees of belief. Artif. Intell., 87(1-2):75--143, 1996.
[5]
R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217--228, 2005.
[6]
J. W. Byun, Y. Sohn, E. Bertino, and N. Li. Secure anonymization for incremental datasets. In SDM, pages 48--63, 2006.
[7]
B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In ICDE, pages 205--216, 2005.
[8]
V. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, pages 279--288, 2002.
[9]
D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In SIGMOD, pages 217--228, 2006.
[10]
N. Koudas, D. Srivastava, T. Yu, and Q. Zhang. Aggregate query answering on anonymized tables. In ICDE, 2007.
[11]
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Workload-aware anonymization. In SIGKDD, 2006.
[12]
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In SIGMOD, pages 49--60, 2005.
[13]
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE, 2006.
[14]
N. Li and T. Li. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, 2007.
[15]
A. Machanavajjhala, J. Gehrke, and D. Kifer. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006.
[16]
D. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Halpern. Worst-case background knowledge in privacy. In ICDE, 2007.
[17]
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, pages 223--228, 2004.
[18]
P. Samarati. Protecting respondents' identities in microdata release. TKDE, 13(6):1010--1027, 2001.
[19]
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In PODS, page 188, 1998.
[20]
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):571--588, 2002.
[21]
K. Wang and B. C. M. Fung. Anonymizing sequential releases. In SIGKDD, pages 414--423, 2006.
[22]
X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In VLDB, pages 139--150, 2006.
[23]
X. Xiao and Y. Tao. Personalized privacy preservation. In SIGMOD, pages 229--240, 2006.

Cited By

View all
  • (2025)Adversarial/External Knowledge (Privacy in the Presence of)Encyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_902(42-46)Online publication date: 8-Jan-2025
  • (2024)Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledgeProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664489(1-12)Online publication date: 30-Jul-2024
  • (2024)m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data PublishingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335455719(2854-2864)Online publication date: 1-Jan-2024
  • Show More Cited By

Index Terms

  1. M-invariance: towards privacy preserving re-publication of dynamic datasets

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGMOD '07: Proceedings of the 2007 ACM SIGMOD international conference on Management of data
    June 2007
    1210 pages
    ISBN:9781595936868
    DOI:10.1145/1247480
    • General Chairs:
    • Lizhu Zhou,
    • Tok Wang Ling,
    • Program Chair:
    • Beng Chin Ooi
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 June 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. m-invariance
    2. generalization
    3. privacy

    Qualifiers

    • Article

    Conference

    SIGMOD/PODS07
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 785 of 4,003 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)45
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 27 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Adversarial/External Knowledge (Privacy in the Presence of)Encyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_902(42-46)Online publication date: 8-Jan-2025
    • (2024)Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledgeProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664489(1-12)Online publication date: 30-Jul-2024
    • (2024)m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data PublishingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335455719(2854-2864)Online publication date: 1-Jan-2024
    • (2024)Privacy Preserving Continuous Big Data Publishing2024 4th International Conference on Embedded & Distributed Systems (EDiS)10.1109/EDiS63605.2024.10783344(109-114)Online publication date: 3-Nov-2024
    • (2024)Enhancing Security of Generalization Methods Based on m-Invariance for Dynamic Data Publication2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC61105.2024.00232(1548-1549)Online publication date: 2-Jul-2024
    • (2024)A Real-time Privacy Monitoring System for Multi-tasks-based Privacy-disclosure in CrowdsourcingIEEE Access10.1109/ACCESS.2024.3513796(1-1)Online publication date: 2024
    • (2024)MPLDP: Multi-Level Personalized Local Differential Privacy MethodIEEE Access10.1109/ACCESS.2024.343086312(99739-99754)Online publication date: 2024
    • (2024)A Taxonomy of Syntactic Privacy Notions for Continuous Data PublishingIEEE Access10.1109/ACCESS.2024.336885212(38490-38511)Online publication date: 2024
    • (2024)On responsible machine learning datasets emphasizing fairness, privacy and regulatory norms with examples in biometrics and healthcareNature Machine Intelligence10.1038/s42256-024-00874-y6:8(936-949)Online publication date: 12-Aug-2024
    • (2024)Semi-local Time sensitive Anonymization of Clinical DataScientific Data10.1038/s41597-024-04192-111:1Online publication date: 20-Dec-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media