Privacy in Elections: k-Anonymizing Preference Orders

نویسنده

  • Nimrod Talmon
چکیده

We study the (parameterized) complexity of a combinatorial problem, motivated by the desire to publish elections-related data, while preserving the privacy of the voters (humans or agents). In this problem, introduced and defined here, we are given an election, a voting rule, and a distance function over elections. The task is to find an election which is not too far away from the original election (with respect to the given distance function) while preserving the election winner (with respect to the given voting rule), and such that the resulting election is k-anonymized; an election is said to be k-anonymous if for each voter in it there are at least k − 1 other voters with the same preference order. We consider the problem of k-anonymizing elections for the Plurality rule and for the Condorcet rule, for the Discrete distance and for the Swap distance. We show that the parameterized complexity landscape of our problem is diverse, with cases ranging from being polynomial-time solvable to Para-NP-hard.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

Currently, although prevalent location privacy methods based on k-anonymizing spatial regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS), users cannot obtain accurate query results. To address this problem, it proposes a new location privacy-preserving k-anonymity method based on the credible chain with two major features. First, the optimal k value for ...

متن کامل

PRO The case for Internet Voting

H ow the Internet might alter U.S. democratic institutions, including how Americans get information about and even vote for their public officials in general elections, has been the subject of much debate in recent months. Online voting is one of the more controversial aspects of this debate—a subject that began to claim international attention in March 2000 when the Arizona Democratic Party al...

متن کامل

A Survey on Optimized Structural Diversity

This paper identifies various concepts involved in social networks for anonymizing the original details of the user. We focus on the various methods that can be applied for applying the anonymization techniques. The methods used are re-identification, k-isomorphism, k-automorphism and k w -SDA. These methods are used to provide the security and privacy for each user and the community in the soc...

متن کامل

M-Partition Privacy Scheme to Anonymizing Set-Valued Data

In distributed databases there is an increasing need for sharing data that contain personal information. The existing system presented collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. M-privacy guarantees that anonymized data satisfies a given privacy constraint against any group of up to m colluding data providers. The heuristic al...

متن کامل

The control complexity of r-approval: from the single-peaked case to the general case

Single-peaked elections have been attracting much attention recently. It turned out that manyNPhard voting problems become polynomial-time solvable when restricted to single-peaked elections. A natural generalization of the single-peaked elections is the k-peaked elections, where at most k peaks are allowed in each vote in the election. In this paper, we mainly aim at establishing a complexity ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015