On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets
نویسندگان
چکیده
Data anonymization is gaining much attention these days as it provides the fundamental requirements to safely outsource datasets containing identifying information. While some techniques add noise to protect privacy others use generalization to hide the link between sensitive and non-sensitive information or separate the dataset into clusters to gain more utility. In the latter, often referred to as bucketization, data values are kept intact, only the link is hidden to maximize the utility. In this paper, we showcase the limits of disassociation, a bucketization technique that divides a set-valued dataset into km-anonymous clusters. We demonstrate that a privacy breach might occur if the disassociated dataset is subject to a cover problem. We finally evaluate the privacy breach using the quantitative privacy breach detection algorithm on real disassociated datasets.
منابع مشابه
Group Generalized Interval-valued Intuitionistic Fuzzy Soft Sets and Their Applications in\ Decision Making
Interval-valued intuitionistic fuzzy sets (IVIFSs) are widely used to handle uncertainty and imprecision in decision making. However, in more complicated environment, it is difficult to express the uncertain information by an IVIFS with considering the decision-making preference. Hence, this paper proposes a group generalized interval-valued intuitionistic fuzzy soft set (G-GIVIFSS) which conta...
متن کاملImproved Univariate Microaggregation for Integer Values
Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. The problem of producing useful protected datasets is addressed in multiple computational priva...
متن کاملPublishing Set-Valued Data via Differential Privacy
Set-valued data provides enormous opportunities for various data mining tasks. In this paper, we study the problem of publishing set-valued data for data mining tasks under the rigorous differential privacy model. All existing data publishing methods for set-valued data are based on partitionbased privacy models, for example k-anonymity, which are vulnerable to privacy attacks based on backgrou...
متن کاملThe Right to Prisoners’ Privacy: Dimensions, Effects and Indicators.
The right to privacy is subject was defined by Shariah and law and it refer to exploration prohibition and kind of human life aspects which are called positivism area. Article constitution is known as one of the most important rights for people in community closely linked to the right to privacy. The authors, considering that the prisoners are also human and his conviction should not deprive h...
متن کاملOn the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
متن کامل