Balancing between Utility and Privacy for k-Anonymity

被引:0
|
作者
Babu, Korra Sathya [1 ]
Jena, Sanjay Kumar [1 ]
机构
[1] NIT Rourkela, Dept Comp Sci & Engn, Rourkela, India
关键词
Data Mining; Clustering; k-Anonymity; Privacy; Utility;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Organizations need to anonymize the data before releasing them so that data mining cannot predict private information. It's the duty of every organization to ensure privacy of its stakeholders. There is a tradeoff between privacy and utility of the released data. Many methods have been proposed earlier for correlating between the released data and the actual data. All of them use the information theoretic measures. Various methods have been proposed to tackle the privacy preservation problem like Anonymization and perturbation; but the natural consequence of privacy preservation is information loss. The loss of specific information about certain individuals may affect the data quality and in extreme case the data may become completely useless. There are methods like cryptography which completely anonymize the dataset and which renders the dataset useless making the utility of the data is completely lost. One needs to protect the private information and preserve the data utility as much as possible. The objective of this paper is to find an optimum balance between privacy and utility while publishing dataset of any organization. Privacy preservation is hard requirement that must be satisfied and utility is the measure to be optimized. One of the methods for preserving privacy is k-Anonymization which also preserves privacy to a good extent. Many other methods also were proposed after k- Anonymity, but they are impractical. The balancing point will vary from dataset to dataset and the choice of Quasi-identifier sensitive attribute and number of records.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [21] Multi-Level Privacy Preserving K-Anonymity
    Weng, Jui-Hung
    Chi, Po-Wen
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 61 - 67
  • [22] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
  • [23] A K-Anonymity Based Schema for Location Privacy Preservation
    Fei, Fan
    Li, Shu
    Dai, Haipeng
    Hu, Chunhua
    Dou, Wanchun
    Ni, Qiang
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02): : 156 - 167
  • [24] Adaptive k-Anonymity Approach for Privacy Preserving in Cloud
    Karuna Arava
    Sumalatha Lingamgunta
    Arabian Journal for Science and Engineering, 2020, 45 : 2425 - 2432
  • [25] Towards a Privacy Diagnosis Centre: Measuring k-anonymity
    Mirakabad, Mohammad Reza Zare
    Jantan, Aman
    Bressan, Stephane
    CSA 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 102 - +
  • [26] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [27] Privacy in manifolds: Combining k-anonymity with differential privacy on Frechet means
    Garg, Sonakshi
    Torra, Vicenc
    COMPUTERS & SECURITY, 2024, 144
  • [28] Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation
    Casino, Fran
    Domingo-Ferrer, Josep
    Patsakis, Constantinos
    Puig, Domenec
    Solanas, Agusti
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 490 - 497
  • [29] Fine-grained k-anonymity for privacy preserving in cloud
    Arava, Karuna
    Lingamgunta, Sumalatha
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2019, 23 (04) : 241 - 247
  • [30] Anatomy: Uncertain data k-anonymity privacy protection algorithm
    Ren, Xiangmin
    Jia, Boxuan
    Wang, Kechao
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1689 - +