Balancing between Utility and Privacy for k-Anonymity

被引:0
|
作者
Babu, Korra Sathya [1 ]
Jena, Sanjay Kumar [1 ]
机构
[1] NIT Rourkela, Dept Comp Sci & Engn, Rourkela, India
关键词
Data Mining; Clustering; k-Anonymity; Privacy; Utility;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Organizations need to anonymize the data before releasing them so that data mining cannot predict private information. It's the duty of every organization to ensure privacy of its stakeholders. There is a tradeoff between privacy and utility of the released data. Many methods have been proposed earlier for correlating between the released data and the actual data. All of them use the information theoretic measures. Various methods have been proposed to tackle the privacy preservation problem like Anonymization and perturbation; but the natural consequence of privacy preservation is information loss. The loss of specific information about certain individuals may affect the data quality and in extreme case the data may become completely useless. There are methods like cryptography which completely anonymize the dataset and which renders the dataset useless making the utility of the data is completely lost. One needs to protect the private information and preserve the data utility as much as possible. The objective of this paper is to find an optimum balance between privacy and utility while publishing dataset of any organization. Privacy preservation is hard requirement that must be satisfied and utility is the measure to be optimized. One of the methods for preserving privacy is k-Anonymization which also preserves privacy to a good extent. Many other methods also were proposed after k- Anonymity, but they are impractical. The balancing point will vary from dataset to dataset and the choice of Quasi-identifier sensitive attribute and number of records.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [41] Location privacy: going beyond K-anonymity, cloaking and anonymizers
    Ali Khoshgozaran
    Cyrus Shahabi
    Houtan Shirani-Mehr
    Knowledge and Information Systems, 2011, 26 : 435 - 465
  • [42] Multirelational k-Anonymity
    Nergiz, Mehmet Ercan
    Clifton, Christopher
    Nergiz, Ahmet Erhan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (08) : 1104 - 1117
  • [43] Hybrid k-Anonymity
    Nergiz, Mehmet Ercan
    Gok, Muhammed Zahit
    COMPUTERS & SECURITY, 2014, 44 : 51 - 63
  • [44] (k, ε, δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
    Tsou, Yao-Tung
    Alraja, Mansour Naser
    Chen, Li-Sheng
    Chang, Yu-Hsiang
    Hu, Yung-Li
    Huang, Yennun
    Yu, Chia-Mu
    Tsai, Pei-Yuan
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (03) : 175 - 185
  • [45] k-Presence-Secrecy: Practical Privacy Model as Extension of k-Anonymity
    Yamaoka, Yuji
    Itoh, Kouichi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (04): : 730 - 740
  • [46] Multirelational k-anonymity
    Nergiz, M. Ercan
    Clifton, Chris
    Nergiz, A. Ethan
    2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2007, : 1392 - +
  • [47] Weak k-anonymity:: A low-distortion model for protecting privacy
    Atzori, Maurizio
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 60 - 71
  • [48] Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing
    Foerster, David
    Loehr, Hans
    Kargl, Frank
    2015 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2015, : 279 - 286
  • [49] kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity
    Kisilevich, Slava
    Elovici, Yuval
    Shapira, Bracha
    Rokach, Lior
    PROTECTING PERSONS WHILE PROTECTING THE PEOPLE, 2009, 5661 : 63 - +
  • [50] Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity
    Sun, Hui
    Huang, Cheng
    Cheng, Xu
    Chen, Fulong
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 258 - 264