Evaluating the impact of k-anonymization on the inference of interaction networks

被引:0
|
作者
Rijo, Pedro [1 ]
Francisco, Alexandre P. [1 ]
Silva, Mario J. [1 ]
机构
[1] Univ Lisbon, INESC ID, Inst Super Tecn, P-1699 Lisbon, Portugal
关键词
Privacy-preserving data publishing; Academic data publishing; Network inference;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We address the publication of a large academic information dataset while ensuring privacy. We evaluate anonymization techniques achieving the intended protection, while retaining the utility of the anonymized data. The published data can help to infer behaviors and study interaction patterns in an academic population. These could subsequently be used to improve the planning of campus life, such as defining cafeteria opening hours or assessing student performance. Moreover, the nature of academic data is such that many implicit social interaction networks can be derived from available datasets, either anonymized or not, raising the need for researching how anonymity can be assessed in this setting. Hence we quantify the impact of anonymization techniques over data utility and the impact of anonymization on behavioural patterns analysis.
引用
收藏
页码:49 / 72
页数:24
相关论文
共 50 条
  • [31] High utility K-anonymization for social network publishing
    Yazhe Wang
    Long Xie
    Baihua Zheng
    Ken C. K. Lee
    Knowledge and Information Systems, 2014, 41 : 697 - 725
  • [32] Handicapping attacker's confidence: an alternative to k-anonymization
    Ke Wang
    Benjamin C. M. Fung
    Philip S. Yu
    Knowledge and Information Systems, 2007, 11 : 345 - 368
  • [33] Scalable non-deterministic clustering-based k-anonymization for rich networks
    Ros-Martin, Miguel
    Salas, Julian
    Casas-Roma, Jordi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (02) : 219 - 238
  • [34] Scalable non-deterministic clustering-based k-anonymization for rich networks
    Miguel Ros-Martín
    Julián Salas
    Jordi Casas-Roma
    International Journal of Information Security, 2019, 18 : 219 - 238
  • [35] A Hybrid Method For K-Anonymization Using Clustering Technique
    Abd Rahim, Yahaya
    Sahib, Shahrin
    Abd Ghani, Mohd Khanapi
    Yaacob, AsrulHadi
    2011 INTERNATIONAL CONFERENCE ON AEROSPACE ENGINEERING AND INFORMATION TECHNOLOGY (AEIT 2011), 2011, : 17 - 20
  • [36] Handicapping attacker's confidence:: an alternative to k-anonymization
    Wang, Ke
    Fung, Benjamin C. M.
    Yu, Philip S.
    KNOWLEDGE AND INFORMATION SYSTEMS, 2007, 11 (03) : 345 - 368
  • [37] The K-Anonymization Method Satisfying Personalized Privacy Preservation
    Song, Jinling
    Huang, Liming
    Wang, Gang
    Kang, Yan
    Liu, Haibin
    IAEDS15: INTERNATIONAL CONFERENCE IN APPLIED ENGINEERING AND MANAGEMENT, 2015, 46 : 181 - 186
  • [38] A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners
    Ayala-Rivera, Vanessa
    McDonagh, Patrick
    Cerqueus, Thomas
    Murphy, Liam
    TRANSACTIONS ON DATA PRIVACY, 2014, 7 (03) : 337 - 370
  • [39] Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes
    Chester, Sean
    Kapron, Bruce M.
    Ramesh, Ganesh
    Srivastava, Gautam
    Thomo, Alex
    Venkatesh, S.
    SOCIAL NETWORK ANALYSIS AND MINING, 2013, 3 (03) : 381 - 399
  • [40] k-Anonymization without Q-S associations
    Yang, Weijia
    Huang, Shangteng
    ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2007, 4505 : 753 - +