A Better Problem Representation for k -Anonymity

نویسنده

  • Rhonda Chaytor
چکیده

Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. A number of heuristic solutions have been proposed that satisfy a privacy-protection property called k-Anonymity. These solutions use generalization (e.g., transform Federal Government and Local Government into a less specific occupation like Government) to ensure that each person in the database looks identical to at least k-1 other people. Without fair justification, it appears as though genetic algorithms have been discounted as viable solutions for privacy protection. This paper aims to falsify this misconception by proposing a new genetic algorithm that represents column orderings as permutations and adopts an ordered greed approach. After experimenting with real census data, we show improvements over previous genetic algorithms for privacy protection. Furthermore, in the interest of fairness, this work serves as an example of how to control experiment conditions when comparing privacy-protection algorithms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Univariate Microaggregation for Integer Values

Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. The problem of producing useful protected datasets is addressed in multiple computational priva...

متن کامل

An Algebraic Topological Approach to Privacy: Numerical and Categorical Data

In this paper, we cast the classic problem of achieving k-anonymity for a given database as a problem in algebraic topology. Using techniques from this field of mathematics, we propose a framework for k-anonymity that brings new insights and algorithms to anonymize a database. We begin by addressing the simpler case when the data lies in a metric space. This case is instrumental to introduce th...

متن کامل

Matrix representation of a sixth order Sturm-Liouville problem and related inverse problem with finite spectrum

‎In this paper‎, ‎we find matrix representation of a class of sixth order Sturm-Liouville problem (SLP) with separated‎, ‎self-adjoint boundary conditions and we show that such SLP have finite spectrum‎. ‎Also for a given matrix eigenvalue problem $HX=lambda VX$‎, ‎where $H$ is a block tridiagonal matrix and $V$ is a block diagonal matrix‎, ‎we find a sixth order boundary value problem of Atkin...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

A novel local search method for microaggregation

In this paper, we propose an effective microaggregation algorithm to produce a more useful protected data for publishing. Microaggregation is mapped to a clustering problem with known minimum and maximum group size constraints. In this scheme, the goal is to cluster n records into groups of at least k and at most 2k_1 records, such that the sum of the within-group squ...

متن کامل

Adaptive Anonymity via b-Matching

The adaptive anonymity problem is formalized where each individual shares their data along with an integer value to indicate their personal level of desired privacy. This problem leads to a generalization of k-anonymity to the b-matching setting. Novel algorithms and theory are provided to implement this type of anonymity. The relaxation achieves better utility, admits theoretical privacy guara...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007