Balancing between Utility and Privacy for k-Anonymity

被引:0
|
作者
Babu, Korra Sathya [1 ]
Jena, Sanjay Kumar [1 ]
机构
[1] NIT Rourkela, Dept Comp Sci & Engn, Rourkela, India
关键词
Data Mining; Clustering; k-Anonymity; Privacy; Utility;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Organizations need to anonymize the data before releasing them so that data mining cannot predict private information. It's the duty of every organization to ensure privacy of its stakeholders. There is a tradeoff between privacy and utility of the released data. Many methods have been proposed earlier for correlating between the released data and the actual data. All of them use the information theoretic measures. Various methods have been proposed to tackle the privacy preservation problem like Anonymization and perturbation; but the natural consequence of privacy preservation is information loss. The loss of specific information about certain individuals may affect the data quality and in extreme case the data may become completely useless. There are methods like cryptography which completely anonymize the dataset and which renders the dataset useless making the utility of the data is completely lost. One needs to protect the private information and preserve the data utility as much as possible. The objective of this paper is to find an optimum balance between privacy and utility while publishing dataset of any organization. Privacy preservation is hard requirement that must be satisfied and utility is the measure to be optimized. One of the methods for preserving privacy is k-Anonymization which also preserves privacy to a good extent. Many other methods also were proposed after k- Anonymity, but they are impractical. The balancing point will vary from dataset to dataset and the choice of Quasi-identifier sensitive attribute and number of records.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] -diversity: Privacy beyond k-anonymity
    Cornell University
    不详
    ACM Trans. Knowl. Discov. Data, 2007, 1
  • [2] k-anonymity:: A model for protecting privacy
    Sweeney, L
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570
  • [3] Protecting privacy using k-anonymity
    El Emam, Khaled
    Dankar, Fida Kamal
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) : 627 - 637
  • [4] Towards internal privacy and flexible K-anonymity
    Hellani, Hussein
    Kilany, Rima
    Sokhn, Maria
    2015 INTERNATIONAL CONFERENCE ON APPLIED RESEARCH IN COMPUTER SCIENCE AND ENGINEERING (ICAR), 2015,
  • [5] A Distributed k-Anonymity Protocol for Location Privacy
    Zhong, Ge
    Hengartner, Urs
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 253 - 262
  • [6] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    World Wide Web, 2021, 24 : 1551 - 1561
  • [7] A personalized k-anonymity privacy preserving method
    Xu, Yong
    Qin, Xiaolin
    Yang, Zhongxue
    Yang, Yitao
    Li, Kun
    Journal of Information and Computational Science, 2013, 10 (01): : 139 - 155
  • [8] Privacy in VoIP Networks: A k-Anonymity Approach
    Srivatsa, Mudhakar
    Iyengar, Arun
    Liu, Ling
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2856 - 2860
  • [9] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [10] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684