Privacy-preserving distributed k-anonymity

被引:0
|
作者
Jiang, W [1 ]
Clifton, C [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
k-anonymity; privacy; security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous data, the model has been that of a single source wanting to publish data. This paper presents a k-anonymity protocol when the data is vertically partitioned between sites. A key contribution is a proof that the protocol preserves k-anonymity between the sites: While one site may have individually identifiable data, it learns nothing that violates k-anonymity with respect to the data at the other site. This is a fundamentally different distributed privacy definition than that of Secure Multiparty Computation, and it provides a better match with both ethical and legal views of privacy.
引用
收藏
页码:166 / 177
页数:12
相关论文
共 50 条
  • [41] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    World Wide Web, 2021, 24 : 1551 - 1561
  • [42] Privacy in VoIP Networks: A k-Anonymity Approach
    Srivatsa, Mudhakar
    Iyengar, Arun
    Liu, Ling
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2856 - 2860
  • [43] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [44] Privacy preserving data publishing of categorical data through k-anonymity and feature selection
    Aristodimou, Aristos
    Antoniades, Athos
    Pattichis, Constantinos S.
    HEALTHCARE TECHNOLOGY LETTERS, 2016, 3 (01) : 16 - 21
  • [45] PEAK: Privacy-Enhanced Incentive Mechanism for Distributed K-Anonymity in LBS
    Zhang, Man
    Li, Xinghua
    Miao, Yinbin
    Luo, Bin
    Ren, Yanbing
    Ma, Siqi
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (02) : 781 - 794
  • [46] Medical Ethics Privacy Protection Based on Combining Distributed Randomization With K-anonymity
    Xie, Yonghong
    He, Qing
    Zhang, Dezheng
    Hu, Xiaojing
    2015 8th International Congress on Image and Signal Processing (CISP), 2015, : 1577 - 1582
  • [47] Balancing between Utility and Privacy for k-Anonymity
    Babu, Korra Sathya
    Jena, Sanjay Kumar
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 1 - 8
  • [48] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [49] Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
    Sun, Xiaoxun
    Wang, Hua
    Li, Jiuyong
    Truta, Traian Marius
    TRANSACTIONS ON DATA PRIVACY, 2008, 1 (02) : 53 - 66
  • [50] A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
    B. Sowmiya
    E. Poovammal
    Wireless Personal Communications, 2022, 127 : 1359 - 1376