Anatomy: Privacy and Correlation Preserving Publication

نویسندگان

  • Xiaokui Xiao
  • Yufei Tao
چکیده

This article presents the anatomy technique for anonymized publication of sensitive data. Anatomy releases all the quasi-identifier and sensitive values directly in two separate tables. Combined with a grouping mechanism, this approach effectively protects privacy, and captures a large amount of correlation in the microdata. We propose an efficient algorithm for computing anatomized tables that fulfill the l-diversity anonymity requirement, and minimize the error of reconstructing the microdata, according to any Lp norm, the KL-divergence, and the discernability metrics. The algorithm is accompanied by optional heuristics that continuously enhance the data utility of anatomy, until a user-specified time limit has been reached. We also provide detailed explanations about how to leverage anatomized tables to understand the characteristics of the microdata. Extensive experiments confirm that anatomy allows significantly more accurate data analysis than conventional anonymization methods based on generalization and data swapping. The short version of this article appeared in VLDB 06. The current submission improves our preliminary work by (i) including a thorough discussion of the previous methods, (ii) extending the analysis of anatomy to several other metrics of information loss (i.e., generic Lp norm, KL-divergence, and discernability), (iii) elaborating how to deploy the anonymized data for statistical studies, (iv) presenting a new algorithm for computing anatomized tables, and (v) featuring a more comprehensive experimental evaluation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Differentially Private Local Electricity Markets

Privacy-preserving electricity markets have a key role in steering customers towards participation in local electricity markets by guarantying to protect their sensitive information. Moreover, these markets make it possible to statically release and share the market outputs for social good. This paper aims to design a market for local energy communities by implementing Differential Privacy (DP)...

متن کامل

Privacy-Preserving Distributed Event Corroboration

Privacy-Preserving Distributed Event Correlation Janak J. Parekh Event correlation is a widely-used data processing methodology, and is useful for the distributed monitoring of software faults and vulnerabilities. Most existing solutions have focused on “intra-organizational” correlation; organizations typically employ privacy policies that prohibit the exchange of information outside of the or...

متن کامل

Limiting Attribute Disclosure in Randomization Based Microdata Release

Privacy preserving microdata publication has received wide attention. In this paper, we investigate the randomization approach and focus on attribute disclosure under linking attacks. We give efficient solutions to determine optimal distortion parameters, such that we can maximize utility preservation while still satisfying privacy requirements. We compare our randomization approach with l-dive...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008