Privacy-preserving distributed k-anonymity

被引:0
|
作者
Jiang, W [1 ]
Clifton, C [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
k-anonymity; privacy; security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous data, the model has been that of a single source wanting to publish data. This paper presents a k-anonymity protocol when the data is vertically partitioned between sites. A key contribution is a proof that the protocol preserves k-anonymity between the sites: While one site may have individually identifiable data, it learns nothing that violates k-anonymity with respect to the data at the other site. This is a fundamentally different distributed privacy definition than that of Secure Multiparty Computation, and it provides a better match with both ethical and legal views of privacy.
引用
收藏
页码:166 / 177
页数:12
相关论文
共 50 条
  • [31] k-anonymity:: A model for protecting privacy
    Sweeney, L
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570
  • [32] Distribution-preserving k-anonymity
    Wei, Dennis
    Ramamurthy, Karthikeyan Natesan
    Varshney, Kush R.
    STATISTICAL ANALYSIS AND DATA MINING, 2018, 11 (06) : 253 - 270
  • [33] Protecting privacy using k-anonymity
    El Emam, Khaled
    Dankar, Fida Kamal
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) : 627 - 637
  • [34] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain
    Liu H.
    Li X.-H.
    Luo B.
    Wang Y.-W.
    Ren Y.-B.
    Ma J.-F.
    Ding H.-F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
  • [35] K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments
    Burke, Mark-John
    Kayem, Anne V. D. M.
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 833 - 840
  • [36] A Coalitional Game Theoretic Mechanism for Privacy Preserving Publishing Based on k-Anonymity
    Chakravarthy, Srinivasa L.
    Kumari, Valli V.
    Sarojini, Ch
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 889 - 896
  • [37] Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions
    Qian, Jin
    Jiang, Haoying
    Yu, Ying
    Wang, Hui
    Miao, Duoqian
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 239
  • [38] Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions
    Qian, Jin
    Jiang, Haoying
    Yu, Ying
    Wang, Hui
    Miao, Duoqian
    Expert Systems with Applications, 2024, 239
  • [39] Towards internal privacy and flexible K-anonymity
    Hellani, Hussein
    Kilany, Rima
    Sokhn, Maria
    2015 INTERNATIONAL CONFERENCE ON APPLIED RESEARCH IN COMPUTER SCIENCE AND ENGINEERING (ICAR), 2015,
  • [40] KAMP: Preserving k-anonymity for Combinations of Patterns
    Hsu, Chia-Hao
    Tsai, Hsiao-Ping
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 97 - 102