Present and future research on controlled tabular adjustment

نویسندگان

  • Jordi Castro
  • José A. González
چکیده

Controlled tabular adjustment (CTA) can be classified within the group of approaches that perturb output data (i.e., tabular data), unlike other methods that focus on the original microdata. Being a post-tabular data perturbation technique it becomes easier to guarantee consistency and quality of the released information (e.g., table additivity, preservation of subtotal or total cells of the original table, etc.). On the other hand, it may be computationally more costly than pre-tabular strategies. The purpose of this work is twofold. First, we will review a recently used heuristic to suboptimally solve CTA (which is a mixed integer linear optimization problem). For some tables this heuristic provided decent solutions much faster than other state-of-the-art optimization methods. This approach can be useful when CTA is applied to a pre-defined ”static” set of tables. The second goal of the paper is to provide and discuss variants of CTA when applied in an on-line table generation system. In this case, tables can be dynamically generated over time, and CTA has to face two new challenges: (i) it has to deliver an on-line fast solution; (ii) protection senses of sensitive cells have to be consistent (i.e, the same) when the same sensitive cell appears in two (or more) tables which are generated and protected at different moments. Some of these ideas will be implemented in the recently started Data without Boundaries FP7 EU project.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Perspective Reformulations of the CTA Problem with L2 Distances

Any institution that disseminates data in aggregated form has the duty to ensure that individual confidential information is not disclosed, either by not releasing data or by perturbing the released data, while maintaining data utility. Controlled tabular adjustment (CTA) is a promising technique of the second type where a protected table that is close to the original one in some chosen distanc...

متن کامل

Extending controlled tabular adjustment for non-additive tabular data with negative protection levels

Minimum distance controlled tabular adjustment (CTA) is a recent perturbative methodology for the protection of tabular data. An implementation of CTA was recently used by Eurostat for the protection of European Union level structural business and animal production statistics. The realworld instances to be solved forced the classical CTA model to be extended with two features: first, to deal wi...

متن کامل

On Assessing the Disclosure Risk of Controlled Adjustment Methods for Statistical Tabular Data

Minimum distance controlled tabular adjustment is a recent perturbative approach for statistical disclosure control in tabular data. Given a table to be protected, it looks for the closest safe table, using some particular distance. Controlled adjustment is known to provide high data utility. However, the disclosure risk has only been partially analyzed using theoretical results from optimizati...

متن کامل

Fix-and-relax approaches for controlled tabular adjustment

Controlled tabular adjustment (CTA) is a relatively new protection technique for tabular data protection. CTA formulates a mixed integer linear programming problem, which is challenging for tables of moderate size. Even finding a feasible initial solution may be a challenging task for large instances. On the other hand, end users of tabular data protection techniques give priority to fast execu...

متن کامل

Exact, Heuristic and Metaheuristic Methods for Confidentiality Protection by Controlled Tabular Adjustment

Government agencies and commercial organizations that report data face the task of representing the data meaningfully while simultaneously protecting the confidentiality of critical data components. The challenge is to organize and disseminate data in a form that prevents these components from being unmasked by corporate espionage, or falling prey to efforts to penetrate the security of the inf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011