Balancing between Utility and Privacy for k-Anonymity

被引:0
|
作者
Babu, Korra Sathya [1 ]
Jena, Sanjay Kumar [1 ]
机构
[1] NIT Rourkela, Dept Comp Sci & Engn, Rourkela, India
关键词
Data Mining; Clustering; k-Anonymity; Privacy; Utility;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Organizations need to anonymize the data before releasing them so that data mining cannot predict private information. It's the duty of every organization to ensure privacy of its stakeholders. There is a tradeoff between privacy and utility of the released data. Many methods have been proposed earlier for correlating between the released data and the actual data. All of them use the information theoretic measures. Various methods have been proposed to tackle the privacy preservation problem like Anonymization and perturbation; but the natural consequence of privacy preservation is information loss. The loss of specific information about certain individuals may affect the data quality and in extreme case the data may become completely useless. There are methods like cryptography which completely anonymize the dataset and which renders the dataset useless making the utility of the data is completely lost. One needs to protect the private information and preserve the data utility as much as possible. The objective of this paper is to find an optimum balance between privacy and utility while publishing dataset of any organization. Privacy preservation is hard requirement that must be satisfied and utility is the measure to be optimized. One of the methods for preserving privacy is k-Anonymization which also preserves privacy to a good extent. Many other methods also were proposed after k- Anonymity, but they are impractical. The balancing point will vary from dataset to dataset and the choice of Quasi-identifier sensitive attribute and number of records.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [31] k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
    Li, Taiyong
    Tang, Changjie
    Wu, Jiang
    Luo, Qian
    Li, Shengzhi
    Lin, Xun
    Zuo, Jie
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2008, : 697 - 701
  • [32] Achieving k-anonymity privacy protection using generalization and suppression
    Sweeney, L
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 571 - 588
  • [33] A k-anonymity clustering method for effective data privacy preservation
    Chin, Chuang-Cheng
    Tsai, Chieh-Yuan
    ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2007, 4632 : 89 - 99
  • [34] SocialCloaking: a Distributed Architecture for K-anonymity Location Privacy Protection
    Hwang, Ren-Hung
    Huang, Fu-Hui
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 247 - 251
  • [35] Research on uncertain data privacy protection based on K-anonymity
    Jing, Yang
    Xiangmin, Ren
    Jianpei, Zhang
    Kechao, Wang
    Jing, Y. (yangjing@hrbeu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04): : 140 - 149
  • [36] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18
  • [37] An Adaptive Learning Model for k-Anonymity Location Privacy Protection
    Natesan, Gayathri
    Liu, Jigang
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16
  • [38] Capture inference attacks for K-Anonymity with privacy inference logic
    Ye, Xiaojun
    Li, Zude
    Li, Yongnian
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 676 - +
  • [39] Improving k-anonymity based privacy preservation for collaborative filtering
    Wei, Ruoxuan
    Tian, Hui
    Shen, Hong
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 67 : 509 - 519
  • [40] Location privacy: going beyond K-anonymity, cloaking and anonymizers
    Khoshgozaran, Ali
    Shahabi, Cyrus
    Shirani-Mehr, Houtan
    KNOWLEDGE AND INFORMATION SYSTEMS, 2011, 26 (03) : 435 - 465