Risk-Efficient Bayesian Data Synthesis for Privacy Protection
نویسندگان
چکیده
Abstract Statistical agencies utilize models to synthesize respondent-level data for release the public privacy protection. In this study, we efficiently induce protection into any Bayesian synthesis model by employing a pseudo-likelihood that exponentiates each likelihood contribution an observation record-indexed weight ∈[0,1], defined be inversely proportional identification risk record. We start with marginal probability of record, which is composed as identity record may disclosed. Our application Consumer Expenditure Surveys (CE) U.S. Bureau Labor Statistics demonstrates marginally risk-weighted synthesizer provides overall improved However, risks actually increase some moderate-risk records after pseudo-posterior estimation owing increased isolation weighting, phenomenon label “whack-a-mole.” proceed construct from collection pairwise probabilities other records, where measures joint reidentification pair mitigates whack-a-mole issue and produces more efficient set synthetic lower higher utility CE data.
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملData Anonymization for Privacy Protection
Social networks have become the universal consumer phenomena and have emerged with increasing popularity nowadays. The amount of network data grows enormously due to the increase of networking websites. The development of social networks has led to the increasing demand for the protection of privacy in publishing the social network data as the social network sites are accumulated with large amo...
متن کاملPrivacy Risk Perceptions and Privacy Protection Strategies
Several opinion polls have reported that many people claim to be concerned about their privacy, yet that most people in fact do very little to protect their privacy. Are privacy concerns indeed insufficient motivators to adopt privacy protection strategies? What then characterizes the users of these strategies? On the basis of a large scale survey amongst Dutch students, this paper explores the...
متن کاملPrivacy - DRM : Data Protection by Copy Protection ?
Protecting media contents and enforcing privacy policies seem to be related problems: mechanisms are needed to restrict data processing outside the copyright holder’s, respectively data subject’s, domain of control. A systematic analysis of requirements, properties, and experiences with digital rights management (DRM) reveals substantial differences between Content-DRM to protect media contents...
متن کاملPrivacy Protection for Dynamic Data through Anonymization
Most of the existing privacy-preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are continuous, transient, and usually unbounded. Moreover, in streaming applications, there is a need to offer strong guarantees on the maximum allowed delay between incoming data and the corresponding anonymized output. To ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of survey statistics and methodology
سال: 2021
ISSN: ['2325-0984', '2325-0992']
DOI: https://doi.org/10.1093/jssam/smab013