On Sampling, Anonymization, and Differential Privacy Or, K-Anonymization Meets Differential Privacy

被引:0
|
作者
Li, Ninghui [1 ]
Qardaji, Wahbeh [1 ]
Su, Dong [1 ]
机构
[1] Purdue Univ, 305 N Univ St, W Lafayette, IN 47907 USA
来源
7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012) | 2012年
基金
美国国家科学基金会;
关键词
Differential Privacy; Anonymization; Data Privacy; ANONYMITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper aims at answering the following two questions in privacy-preserving data analysis and publishing: What formal privacy guarantee (if any) does k-anonymization provide? How can we benefit from the adversary's uncertainty about the data? We have found that random sampling provides a connection that helps answer these two questions, as sampling can create uncertainty. The main result of the paper is that k-anonymization, when done "safely", and when preceded with a random sampling step, satisfies (epsilon, delta)-differential privacy with reasonable parameters. This result illustrates that "hiding in a crowd of k" indeed offers some privacy guarantees. We point out, however, that almost all existing k-anonymization algorithms in the literature are not "safe". Regarding the second question, we provide both positive and negative results. On the positive side, we show that adding a random-sampling pre-processing step to a differentially-private algorithm can greatly amplify the level of privacy protection. Hence, when given a dataset resulted from sampling, one can utilize a much large privacy budget. On the negative side, any privacy notion that takes advantage of the adversary's uncertainty, likely does not compose.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Research in microaggregation algorithms for k-anonymization
    Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
    不详
    Tien Tzu Hsueh Pao, 2008, 10 (2021-2029):
  • [42] Evaluating Privacy Metrics for Graph Anonymization and De-anonymization
    Zhao, Yuchen
    Wagner, Isabel
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 817 - 819
  • [43] How to find an appropriate k for k-anonymization
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 273 - 279
  • [44] Flexible sensitive K-anonymization on transactions
    Tsai, Yu-Chuan
    Wang, Shyue-Liang
    Ting, I-Hsien
    Hong, Tzung-Pei
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (04): : 2391 - 2406
  • [45] Frequent tables for fast K-anonymization
    Yang, Xiaochun
    Liu, Xiangyu
    Wang, Bin
    Yu, Ge
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1239 - 1242
  • [46] Evaluation of Generalization Based K-Anonymization Algorithms
    Patil, Devyani
    Mohapatra, Ramesh K.
    Babu, Korra Sathya
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 171 - 175
  • [47] A Study on Fuzzy Clustering-based k-anonymization for Privacy Preserving Crowd Movement Analysis with Face Recognition
    Honda, Katsuhiro
    Omori, Masahiro
    Ubukata, Seiki
    Notsu, Akira
    PROCEEDINGS OF THE 2015 SEVENTH INTERNATIONAL CONFERENCE OF SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2015), 2015, : 37 - 41
  • [48] K-Anonymization Incremental Maintenance and Optimization Techniques
    Truta, Traian Marius
    Campan, Alina
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 380 - +
  • [49] Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization
    Kotra, Anuraag
    Eldosouky, AbdelRahman
    Sengupta, Shamik
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING (ICACCE-2020), 2020,
  • [50] Secure k-Anonymization over Encrypted Databases
    Kesarwani, Manish
    Kaul, Akshar
    Braghin, Stefano
    Holohan, Naoise
    Antonatos, Spiros
    2021 IEEE 14TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2021), 2021, : 20 - 30