Evaluating the impact of k-anonymization on the inference of interaction networks

被引:0
|
作者
Rijo, Pedro [1 ]
Francisco, Alexandre P. [1 ]
Silva, Mario J. [1 ]
机构
[1] Univ Lisbon, INESC ID, Inst Super Tecn, P-1699 Lisbon, Portugal
关键词
Privacy-preserving data publishing; Academic data publishing; Network inference;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We address the publication of a large academic information dataset while ensuring privacy. We evaluate anonymization techniques achieving the intended protection, while retaining the utility of the anonymized data. The published data can help to infer behaviors and study interaction patterns in an academic population. These could subsequently be used to improve the planning of campus life, such as defining cafeteria opening hours or assessing student performance. Moreover, the nature of academic data is such that many implicit social interaction networks can be derived from available datasets, either anonymized or not, raising the need for researching how anonymity can be assessed in this setting. Hence we quantify the impact of anonymization techniques over data utility and the impact of anonymization on behavioural patterns analysis.
引用
收藏
页码:49 / 72
页数:24
相关论文
共 50 条
  • [41] Definition and Efficient Construction of Encrypted k-anonymization Scheme
    Yoshino, Masayuki
    Suzuki, Takayuki
    Naganuma, Ken
    Sato, Hisayoshi
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 293 - 300
  • [42] Efficient k-Anonymization through Constrained Collaborative Clustering
    Zouinina, Sarah
    Grozavu, Nistor
    Bennani, Younes
    Lyhyaoui, Abdelouahid
    Rogovschi, Nicoleta
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 405 - 411
  • [43] High utility K-anonymization for social network publishing
    Wang, Yazhe
    Xie, Long
    Zheng, Baihua
    Lee, Ken C. K.
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (03) : 697 - 725
  • [44] An Improved K-anonymization Approach for Preserving Graph Structural Properties
    Hanafy, A. Mohammed
    Barakat, Sherif
    Rezk, Amira
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (09) : 199 - 207
  • [45] Towards a more reasonable generalization cost metric for k-anonymization
    Li, Zude
    Zhan, Guoqiang
    Ye, Xiaojun
    FLEXIBLE AND EFFICIENT INFORMATION HANDLING, 2006, 4042 : 258 - 261
  • [46] Counter Deanonymization Query: H -index Based k-Anonymization Privacy Protection for Social Networks
    Gao, Jianliang
    Song, Bo
    Chen, Zheng
    Ke, Weimao
    Ding, Wanying
    Hu, Xiaohua
    SIGIR'17: PROCEEDINGS OF THE 40TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2017, : 809 - 812
  • [47] Optimization algorithm for k-anonymization of datasets with low information loss
    Keisuke Murakami
    Takeaki Uno
    International Journal of Information Security, 2018, 17 : 631 - 644
  • [48] MAGE: A semantics retaining K-anonymization method for mixed data
    Han, Jianmin
    Yu, Juan
    Mo, Yuchang
    Lu, Jianfeng
    Liu, Huawen
    KNOWLEDGE-BASED SYSTEMS, 2014, 55 : 75 - 86
  • [49] A Top-Down k-Anonymization Implementation for Apache Spark
    Sopaoglu, Ugur
    Abul, Osman
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4513 - 4521
  • [50] NESTGate Realizing Personal Data Protection with k-Anonymization Technology
    Morisawa, Yoshihiro
    Matsune, Shinji
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (03): : 37 - 42