MULTIPLE RELEASES OF k-ANONYMOUS DATA SETS AND k-ANONYMOUS RELATIONAL DATABASES

被引:7
|
作者
Stokes, Klara [1 ]
Torra, Vicenc [2 ]
机构
[1] Univ Oberta Catalunya, Internet Interdisciplinary Inst IN3, Barcelona 08018, Catalonia, Spain
[2] CSIC, Artificial Intelligence Res Inst, IIIA, Bellaterra 08193, Catalonia, Spain
关键词
Data privacy; disclosure risk; k-anonymity; databases; MODEL;
D O I
10.1142/S0218488512400260
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In data privacy, the evaluation of the disclosure risk has to take into account the fact that several releases of the same or similar information about a population are common. In this paper we discuss this issue within the scope of k-anonymity. We also show how this issue is related to the publication of privacy protected databases that consist of linked tables. We present algorithms for the implementation of k-anonymity for this type of data.
引用
收藏
页码:839 / 853
页数:15
相关论文
共 50 条
  • [1] k-Anonymous data collection
    Zhong, Sheng
    Yang, Zhiqiang
    Chen, Tingting
    INFORMATION SCIENCES, 2009, 179 (17) : 2948 - 2963
  • [2] K-Anonymous patterns
    Atzori, M
    Bonchi, F
    Giannotti, F
    Pedreschi, D
    KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2005, 2005, 3721 : 10 - 21
  • [3] Hardness of k-anonymous microaggregation
    Thaeter, Florian
    Reischuk, Ruediger
    DISCRETE APPLIED MATHEMATICS, 2021, 303 : 149 - 158
  • [4] Current Developments of k-Anonymous Data Releasing
    Li, Jiuyong
    Wang, Hua
    Jin, Huidong
    Yong, Jianming
    ELECTRONIC JOURNAL OF HEALTH INFORMATICS, 2008, 3 (01):
  • [5] Utility Evaluation of K-anonymous Data by Microaggregation
    Wang Lixia
    Han Jianmin
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 381 - +
  • [6] k-Anonymous Crowd Flow Analytics
    Stanciu, Valeriu-Daniel
    van Steen, Maarten
    Dobre, Ciprian
    Peter, Andreas
    PROCEEDINGS OF THE 17TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2020), 2021, : 376 - 385
  • [7] Privately updating suppression and generalization based k-anonymous databases
    Trombetta, Alberto
    Jiang, Wei
    Bertino, Elisa
    Bossi, Lorenzo
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 1370 - +
  • [8] A Practical k-Anonymous Recommender System
    Igomitros, Athanasios
    Papageorgiou, Achilleas
    Patsakis, Constantinos
    2016 7TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS & APPLICATIONS (IISA), 2016,
  • [9] Computational improvements in parallelized k-anonymous microaggregation of large databases
    Mohamad Mezher, Ahmad
    Garcia Alvarez, Alejandro
    Rebollo-Monedero, David
    Forne, Jordi
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, : 258 - 264
  • [10] A k-anonymous rule clustering approach for data publishing
    Ohki M.
    Inuiguchi M.
    1600, Fuji Technology Press (21): : 980 - 988