MULTIPLE RELEASES OF k-ANONYMOUS DATA SETS AND k-ANONYMOUS RELATIONAL DATABASES

被引:7
|
作者
Stokes, Klara [1 ]
Torra, Vicenc [2 ]
机构
[1] Univ Oberta Catalunya, Internet Interdisciplinary Inst IN3, Barcelona 08018, Catalonia, Spain
[2] CSIC, Artificial Intelligence Res Inst, IIIA, Bellaterra 08193, Catalonia, Spain
关键词
Data privacy; disclosure risk; k-anonymity; databases; MODEL;
D O I
10.1142/S0218488512400260
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In data privacy, the evaluation of the disclosure risk has to take into account the fact that several releases of the same or similar information about a population are common. In this paper we discuss this issue within the scope of k-anonymity. We also show how this issue is related to the publication of privacy protected databases that consist of linked tables. We present algorithms for the implementation of k-anonymity for this type of data.
引用
收藏
页码:839 / 853
页数:15
相关论文
共 50 条
  • [31] K-anonymous location privacy protection scheme for the mobile terminal
    Song C.
    Jin T.
    Ni S.
    He J.
    Du S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 138 - 145
  • [32] A K-anonymous clustering algorithm based on the analytic hierarchy process
    Wang, Kun
    Zhao, Wei
    Cui, Junjie
    Cui, Yanpeng
    Hu, Jianwei
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 59 : 76 - 83
  • [33] KDST: K-Anonymous Node Discovery Using Separation of Trust
    Kabeel, Ali
    Elmougy, Amr
    PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, : 343 - 346
  • [34] Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search notes
    Stokes, Klara
    Farras, Oriol
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (03) : 503 - 524
  • [35] Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search notes
    Klara Stokes
    Oriol Farràs
    Designs, Codes and Cryptography, 2014, 71 : 503 - 524
  • [36] Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis
    Rebollo Monedero, David
    Mohamad Mezher, Ahmad
    Casanova Colome, Xavier
    Forne, Jordi
    Soriano, Miguel
    INFORMATION SCIENCES, 2019, 503 : 417 - 443
  • [37] Similarity-based privacy protection for publishing k-anonymous trajectories
    Wang, Shuai
    Chen, Chunyi
    Zhang, Guijie
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (03)
  • [38] K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data
    Meng, Linghang
    Hong, Xueshu
    Chen, Yingwen
    Ding, Yuke
    Zhang, Chengzhuo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 381 - 393
  • [39] Similarity-based privacy protection for publishing k-anonymous trajectories
    WANG Shuai
    CHEN Chunyi
    ZHANG Guijie
    Frontiers of Computer Science, 2022, 16 (03)
  • [40] Does k-Anonymous Microaggregation Affect Machine-Learned Macrotrends?
    Rodriguez-Hoyos, Ana
    Estrada-Jimenez, Jose
    Rebollo-Monedero, David
    Parra-Arnau, Javier
    Forne, Jordi
    IEEE ACCESS, 2018, 6 : 28258 - 28277