[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Achieving k-anonymity privacy protection using generalization and suppression

Published: 01 October 2002 Publication History

Abstract

Often a data holder, such as a hospital or bank, needs to share person-specific records in such a way that the identities of the individuals who are the subjects of the data cannot be determined. One way to achieve this is to have the released records adhere to k- anonymity, which means each released record has at least (k-1) other records in the release whose values are indistinct over those fields that appear in external data. So, k- anonymity provides privacy protection by guaranteeing that each released record will relate to at least k individuals even if the records are directly linked to external information. This paper provides a formal presentation of combining generalization and suppression to achieve k-anonymity. Generalization involves replacing (or recoding) a value with a less specific but semantically consistent value. Suppression involves not releasing a value at all. The Preferred Minimal Generalization Algorithm (MinGen), which is a theoretical algorithm presented herein, combines these techniques to provide k-anonymity protection with minimal distortion. The real-world algorithms Datafly and µ-Argus are compared to MinGen. Both Datafly and µ-Argus use heuristics to make approximations, and so, they do not always yield optimal results. It is shown that Datafly can over distort data and µ-Argus can additionally fail to provide adequate protection.

References

[1]
1. L. Sweeney, Information Explosion. Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies, L. Zayatz, P. Doyle, J. Theeuwes and J. Lane (eds), Urban Institute, Washington, DC, 2001.
[2]
2. L. Sweeney, Uniqueness of Simple Demographics in the U.S. Population, LIDAP-WP4. Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh, PA: 2000. Forthcoming book entitled, The Identifiability of Data.
[3]
3. L. Sweeney. k-Anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (7), 2002.
[4]
4. T. Dalenius. Finding a needle in a haystack - or dentifying anonymous census record. Journal of Official Statistics, 2(3):329-336, 1986.
[5]
5. L. Sweeney. Guaranteeing anonymity when sharing medical data, the Datafly system. Proceedings, Journal of the American Medical Informatics Association. Washington, DC: Hanley & Belfus, Inc., 1997.
[6]
6. A. Hundepool and L. Willenborg. µ- and τ-argus: software for statistical disclosure control. Third International Seminar on Statistical Confidentiality. Bled: 1996.
[7]
7. J. Ullman. Principles of Database and Knowledge Base Systems. Computer Science Press, Rockville, MD. 1988.
[8]
8. L. Sweeney, Uniqueness of Simple Demographics in the U.S. Population, LIDAP-WP4. Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh, PA: 2000. Forthcoming book entitled, The Identifiability of Data.
[9]
9. L. Sweeney, Computational Disclosure Control: A primer on data privacy protection. Ph.D. Thesis, Massachusetts Institute of Technology, 2001.

Cited By

View all
  • (2024)TraBiMap: Reducing Privacy Concerns in Trajectory Analysis with Randomized Data RepresentationsProceedings of the 2nd ACM SIGSPATIAL International Workshop on Geo-Privacy and Data Utility for Smart Societies10.1145/3681768.3698496(31-34)Online publication date: 29-Oct-2024
  • (2024)Protecting Vehicle Location Privacy with Contextually-Driven Synthetic Location GenerationProceedings of the 32nd ACM International Conference on Advances in Geographic Information Systems10.1145/3678717.3691211(29-41)Online publication date: 29-Oct-2024
  • (2024)Utility-aware Privacy Perturbation for Training DataACM Transactions on Knowledge Discovery from Data10.1145/363941118:4(1-21)Online publication date: 13-Feb-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems  Volume 10, Issue 5
October 2002
153 pages

Publisher

World Scientific Publishing Co., Inc.

United States

Publication History

Published: 01 October 2002

Author Tags

  1. data anonymity
  2. data fusion
  3. data privacy
  4. privacy
  5. re-identification

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)TraBiMap: Reducing Privacy Concerns in Trajectory Analysis with Randomized Data RepresentationsProceedings of the 2nd ACM SIGSPATIAL International Workshop on Geo-Privacy and Data Utility for Smart Societies10.1145/3681768.3698496(31-34)Online publication date: 29-Oct-2024
  • (2024)Protecting Vehicle Location Privacy with Contextually-Driven Synthetic Location GenerationProceedings of the 32nd ACM International Conference on Advances in Geographic Information Systems10.1145/3678717.3691211(29-41)Online publication date: 29-Oct-2024
  • (2024)Utility-aware Privacy Perturbation for Training DataACM Transactions on Knowledge Discovery from Data10.1145/363941118:4(1-21)Online publication date: 13-Feb-2024
  • (2024)Wage Theft and Technology in the Home Care ContextProceedings of the ACM on Human-Computer Interaction10.1145/36374288:CSCW1(1-30)Online publication date: 26-Apr-2024
  • (2024)Group-wise K-anonymity meets (ε, δ) Differentially Privacy SchemeCompanion Proceedings of the ACM Web Conference 202410.1145/3589335.3651517(802-805)Online publication date: 13-May-2024
  • (2024)Learning Location From Shared Elevation Profiles in Fitness Apps: A Privacy PerspectiveIEEE Transactions on Mobile Computing10.1109/TMC.2022.321814823:1(581-596)Online publication date: 1-Jan-2024
  • (2024)UMAP-SMOTENCKnowledge-Based Systems10.1016/j.knosys.2024.112174300:COnline publication date: 18-Nov-2024
  • (2024)A survey of the fusion of traditional data security technology and blockchainExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.124151252:PAOnline publication date: 24-Jul-2024
  • (2024)Distance-based linkage of personal microbiome records for identification and its privacy implicationsComputers and Security10.1016/j.cose.2023.103538136:COnline publication date: 1-Feb-2024
  • (2024)Semantic Tree Based PPDP Technique for Multiple Sensitive Attributes in Inter CloudSN Computer Science10.1007/s42979-024-03079-75:6Online publication date: 26-Jul-2024
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media