Achieving p-sensitive k-anonymity via anatomy
Paper
Paper/Presentation Title | Achieving p-sensitive k-anonymity via anatomy |
---|---|
Presentation Type | Paper |
Authors | Sun, Xiaoxun (Author), Wang, Hua (Author), Li, Jiuyong (Author) and Ross, David (Author) |
Journal or Proceedings Title | Proceedings of the IEEE International Conference on e-Business Engineering (ICEBE 2009) |
Number of Pages | 7 |
Year | 2009 |
Place of Publication | United States |
ISBN | 9780769538426 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/ICEBE.2009.34 |
Web Address (URL) of Paper | https://ieeexplore.ieee.org/document/5342114 |
Conference/Event | ICEBE 2009: IEEE International Conference on e-Business Engineering |
Event Details | Rank B |
Event Details | ICEBE 2009: IEEE International Conference on e-Business Engineering Event Date 21 to end of 23 Oct 2009 Event Location Macau, China |
Abstract | Privacy-preserving data publishing is to protect sensitive information of individuals in published data while the distortion ratio of the data is minimized. One well-studied approach is the K-anonymity model. Recently, several authors have recognized that K-anonymity cannot prevent attribute disclosure. To address this privacy threat, one solution would be to employ P-sensitive K-anonymity, a novel paradigm in relational data privacy, which prevents sensitive attribute disclosure. P-sensitive K-anonymity partitions the data into groups of records such that each group has at least P distinct sensitive values. Existing approaches for achieving P-sensitive K-anonymity are mostly generalization-based. In this paper, we propose a novel permutation-based approach called anatomy to release the quasi-identifier and sensitive values directly in two separate tables. Combined with a grouping mechanism, this approach not only protects privacy, but captures a large amount of correlation in the microdata. We develop a top-down algorithm for computing anatomized tables that obey the P-sensitive K-anonymity privacy requirement, and minimize the error of reconstructing the microdata. Extensive experiments confirm that anatomy allows significantly more effective data analysis than the conventional publication methods based on |
Keywords | privacy-preserving data publishing; K-anonymity model |
ANZSRC Field of Research 2020 | 460599. Data management and data science not elsewhere classified |
460499. Cybersecurity and privacy not elsewhere classified | |
460908. Information systems organisation and management | |
Public Notes | File reproduced in accordance with the copyright policy of the publisher/author. |
Byline Affiliations | Department of Mathematics and Computing |
University of South Australia | |
Faculty of Engineering and Surveying |
https://research.usq.edu.au/item/9z5w3/achieving-p-sensitive-k-anonymity-via-anatomy
Download files
1882
total views480
total downloads3
views this month0
downloads this month