On Distributed k-Anonymization

ثبت نشده
چکیده

When a database owner needs to disclose her data, she can k-anonymize her data to protect the involved individuals’ privacy. However, if the data is distributed between two owners, then it is an open question whether the two owners can jointly k-anonymize the union of their data, such that the information suppressed in one owner’s data is not revealed to the other owner. In this paper, we study this problem of distributed k-anonymization. We have two major results: First, it is impossible to design an unconditionally private protocol that implements any normal k-anonymization function, where normal k-anonymization functions are a very broad class of kanonymization functions, including the k-anonymization functions implemented by all existing k-anonymization algorithms. Second, we give an efficent protocol that implements a normal kanonymization function and show that it is private against polynomial-time adversaries. This protocol is ID-based, which means the two data owners don’t need to have a priori knowledge of each other’s public key. Our results have many potential applications and can be extended to three or more parties.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Distributed Anonymization Protocol to Satisfy Multiple Data Providers Privacy Requirements

Privacy and security concerns are among the main obstacles facing the widespread adoption of this new technology. Data anonymization makes data worthless to anyone except the owner of the data. It is one of the methods for transforming the data in such a way that it prevents identification of key information from an unauthorized person. Most of the existing works use a k-anonymat model for pres...

متن کامل

D2Pt: Privacy-Aware Multiparty Data Publication

Today, publication of medical data faces high legal barriers. On the one hand, publishing medical data is important for medical research. On the other hand, it is neccessary to protect peoples’ privacy by ensuring that the relationship between individuals and their related medical data remains unknown to third parties. Various data anonymization techniques remove as little identifying informati...

متن کامل

State-of-art in Statistical Anonymization Techniques for Privacy Preserving Data Mining

With the increased and vast use of online data, security in data mining has now become very important. Anonymity techniques have proved very useful in distributed computation. More techniques are still under research and improvements for achieving higher level of security in sensitive data. In this paper, we provide a review of the statistical Anonymization methods that can be applied for priva...

متن کامل

Privacy Preserving Techniques on Centralized, Distributed and Social Network Data - A Review

Privacy Preserving Data Publishing refers publishing data in such a way that the privacy of the individuals are preserved. The Published data can further be used for various Data Analysis and Data Mining tasks. Techniques used to preserve privacy of individuals before publishing is called Anonymization Techniques. Initially only centralized data need to be published for analysis and Mining. Lat...

متن کامل

Parallelizing K-Anonymity Algorithm for Privacy Preserving Knowledge Discovery from Big Data

Disclosure control has become inevitable as privacy is given paramount importance while publishing data for mining. The data mining community enjoyed revival after Samarti and Sweeney proposed k-anonymization for privacy preserving data mining. The k-anonymity has gained high popularity in research circles. Though it has some drawbacks and other PPDM algorithms such as l-diversity, t-closeness ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006