Privacy-preserving distributed k-anonymity

被引:0
|
作者
Jiang, W [1 ]
Clifton, C [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
k-anonymity; privacy; security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous data, the model has been that of a single source wanting to publish data. This paper presents a k-anonymity protocol when the data is vertically partitioned between sites. A key contribution is a proof that the protocol preserves k-anonymity between the sites: While one site may have individually identifiable data, it learns nothing that violates k-anonymity with respect to the data at the other site. This is a fundamentally different distributed privacy definition than that of Secure Multiparty Computation, and it provides a better match with both ethical and legal views of privacy.
引用
收藏
页码:166 / 177
页数:12
相关论文
共 50 条
  • [21] Fine-grained k-anonymity for privacy preserving in cloud
    Arava, Karuna
    Lingamgunta, Sumalatha
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2019, 23 (04) : 241 - 247
  • [22] An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data
    Yuan, Linlin
    Zhang, Tiantian
    Chen, Yuling
    Yang, Yuxiang
    Li, Huang
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (01): : 1561 - 1579
  • [23] A Practical Privacy-Preserving Publishing Mechanism Based on Personalized k-Anonymity and Temporal Differential Privacy for Wearable IoT Applications
    Guo, Junqi
    Yang, Minghui
    Wan, Boxin
    SYMMETRY-BASEL, 2021, 13 (06):
  • [24] SocialCloaking: a Distributed Architecture for K-anonymity Location Privacy Protection
    Hwang, Ren-Hung
    Huang, Fu-Hui
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 247 - 251
  • [25] kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity
    Kisilevich, Slava
    Elovici, Yuval
    Shapira, Bracha
    Rokach, Lior
    PROTECTING PERSONS WHILE PROTECTING THE PEOPLE, 2009, 5661 : 63 - +
  • [26] User k-anonymity for privacy preserving data mining of query logs
    Navarro-Arribas, Guillermo
    Torra, Vicenc
    Erola, Arnau
    Castella-Roca, Jordi
    INFORMATION PROCESSING & MANAGEMENT, 2012, 48 (03) : 476 - 487
  • [27] Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model
    Bhaladhare, Pawan R.
    Jinwala, Devesh C.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (01) : 63 - 78
  • [28] Betweenness Centrality Based k-Anonymity for Privacy Preserving in Social Networks
    Tian, Hui
    Lu, Yue
    Liu, Jingtian
    Yu, Jingjing
    16TH INTERNATIONAL CONFERENCE ON ADVANCES IN MOBILE COMPUTING AND MULTIMEDIA (MOMM 2018), 2014, : 3 - 7
  • [29] Spatial K-anonymity: A Privacy-preserving Method for COVID-19 Related Geo-spatial Technologies
    Iyer, Rohan
    Rex, Regina
    McPherson, Kevin P.
    Gandhi, Darshan
    Mahindra, Aryan
    Singh, Abhishek
    Raskar, Ramesh
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON GEOGRAPHICAL INFORMATION SYSTEMS THEORY, APPLICATIONS AND MANAGEMENT (GISTAM), 2021, : 75 - 81
  • [30] -diversity: Privacy beyond k-anonymity
    Cornell University
    不详
    ACM Trans. Knowl. Discov. Data, 2007, 1