On Distributed k-Anonymization

被引:0
|
作者
Zhong, Sheng [1 ]
机构
[1] SUNY Buffalo, Dept Comp Sci & Engn, Amherst, NY 14260 USA
关键词
k-anonymity; protocol; secure computation; PRIVACY; PROTECTION; ANONYMITY;
D O I
10.3233/FI-2009-82
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
When a database owner needs to disclose her data, she can k-anonymize her data to protect the involved individuals' privacy. However, if the data is distributed between two owners, then it is an open question whether the two owners can jointly k-anonymize the union of their data, such that the information suppressed in one owner's data is not revealed to the other owner. In this paper, we study this problem of distributed k-anonymization. We have two major results: First, it is impossible to design an unconditionally private protocol that implements any normal k-anonymization function, where normal k-anonymization functions are a very broad class of k-anonymization functions. Second, we give an efficent protocol that implements a normal k-anonymization function and show that it is private against polynomial-time adversaries. Our results have many potential applications and can be extended to three or more parties.
引用
收藏
页码:411 / 431
页数:21
相关论文
共 50 条
  • [1] Balanced k-Anonymization
    Al-Fedaghi, Sabah S.
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 179 - 182
  • [2] K-anonymization revisited
    Gionis, Aristides
    Mazza, Arnon
    Tassa, Tamir
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 744 - +
  • [3] Thoughts on k-anonymization
    Nergiz, M. Ercan
    Clifton, Chris
    [J]. DATA & KNOWLEDGE ENGINEERING, 2007, 63 (03) : 622 - 645
  • [4] A Hybrid Method for k-Anonymization
    Lin, Jun-Lin
    Wei, Meng-Cheng
    Li, Chih-Wen
    Hsieh, Kuo-Chiang
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 385 - 390
  • [5] Efficient k-anonymization for privacy preservation
    Liang, Z.
    Wei, R.
    [J]. PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 737 - 742
  • [6] Flexible sensitive K-anonymization on transactions
    Yu-Chuan Tsai
    Shyue-Liang Wang
    I-Hsien Ting
    Tzung-Pei Hong
    [J]. World Wide Web, 2020, 23 : 2391 - 2406
  • [7] How to find an appropriate k for k-anonymization
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 273 - 279
  • [8] k-anonymization with minimal loss of information
    Gionis, Aristides
    Tassa, Tamir
    [J]. ALGORITHMS - ESA 2007, PROCEEDINGS, 2007, 4698 : 439 - +
  • [9] Heterogeneous k-Anonymization with High Utility
    Doka, Katerina
    Xue, Mingqiang
    Tsoumakos, Dimitrios
    Karras, Panagiotis
    Cuzzocrea, Alfredo
    Koziris, Nectarios
    [J]. PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2015, : 1886 - 1890
  • [10] k-Anonymization with Minimal Loss of Information
    Gionis, Aristides
    Tassa, Tamir
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (02) : 206 - 219