An efficient hash-based algorithm for minimal k-anonymity
نویسندگان
چکیده
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes of microdata that clearly identify individuals, such as name and medical care card number, are generally removed, these databases can sometimes be joined with other public databases on attributes such as Zip code, Gender and Age to reidentify individuals who were supposed to remain anonymous. “Linking” attacks are made easier by the availability of other complementary databases over the Internet. k-anonymity is a technique that prevents “linking” attacks by generalizing and/or suppressing portions of the released microdata so that no individual can be uniquely distinguished from a group of size k. In this paper, we investigate a practical model of kanonymity, called full-domain generalization. We examine the issue of computing minimal k-anonymous table based on the definition of minimality described by Samarati. We introduce the hash-based technique previously used in mining associate rules and present an efficient hash-based algorithm to find the minimal k-anonymous table, which improves the previous binary search algorithm first proposed by Samarati.
منابع مشابه
Improved Univariate Microaggregation for Integer Values
Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. The problem of producing useful protected datasets is addressed in multiple computational priva...
متن کاملAn Incremental Mining Algorithm for Association Rules Based on Minimal Perfect Hashing and Pruning
In the literatures, hash-based association rule mining algorithms are more efficient than Apriori-based algorithms, since they employ hash functions to generate candidate itemsets efficiently. However, when the dataset is updated, the whole hash table needs to be reconstructed. In this paper, we propose an incremental mining algorithm based on minimal perfect hashing. In our algorithm, each can...
متن کاملCores of random r-partite hypergraphs
We show that the threshold cr,k for appearance of a k-core in a random r-partite r-uniform hypergraph Gr,n,m is the same as for a random r-uniform hypergraph with cn/r edges without the r-partite restriction, where r, k ≥ 2. In both cases, the average degree is c. This is an important problem in the analysis of the algorithm presented in [2]. The algorithm constructs a family of minimal perfect...
متن کاملImproving Anonymity in Shared Key Primitives Based on Perfect Hash Families
We propose a new scheme for sharing symmetric key operations among a set of participants according to a ) , ( n t threshold access structure. We focus on anonymity properties of this scheme and show that this scheme provides improved values of anonymity measures than the existing ones. In particular, the scheme can provide optimal and equitable participant anonymity when it is based on balanced...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کامل