Anonymizing binary and small tables is hard to approximate

被引:9
|
作者
Bonizzoni, Paola [3 ]
Della Vedova, Gianluca [2 ]
Dondi, Riccardo [1 ]
机构
[1] Univ Bergamo, Dipartimento Sci Linguaggi Comunicaz & Degli Stud, Bergamo, Italy
[2] Univ Milano Bicocca, Dipartimento Stat, Milan, Italy
[3] Univ Milano Bicocca, DISCo, Milan, Italy
关键词
k-anonymity; APX-hardness; Computational complexity; Clustering;
D O I
10.1007/s10878-009-9277-y
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization recently proposed is the k-anonymity. This approach requires that the rows in a table are clustered in sets of size at least k and that all the rows in a cluster become the same tuple, after the suppression of some records. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be NP-hard when the values are over a ternary alphabet, k=3 and the rows length is unbounded. In this paper we give a lower bound on the approximation factor that any polynomial-time algorithm can achieve on two restrictions of the problem, namely (i) when the records values are over a binary alphabet and k=3, and (ii) when the records have length at most 8 and k=4, showing that these restrictions of the problem are APX-hard.
引用
收藏
页码:97 / 119
页数:23
相关论文
共 50 条
  • [1] Anonymizing binary and small tables is hard to approximate
    Paola Bonizzoni
    Gianluca Della Vedova
    Riccardo Dondi
    Journal of Combinatorial Optimization, 2011, 22 : 97 - 119
  • [2] Anonymizing tables
    Aggarwal, G
    Feder, T
    Kenthapadi, K
    Motwani, R
    Panigrahy, R
    Thomas, D
    Zhu, A
    DATABASE THEORY - ICDT 2005, PROCEEDINGS, 2005, 3363 : 246 - 258
  • [3] Finding small OBDDs for incompletely specified truth tables is hard
    Kristensen, Jesper Torp
    Miltersen, Peter Bro
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2006, 4112 : 489 - 496
  • [4] DECIMAL TABLES TO BINARY CODED TABLES
    GRIEBROK, M
    COMMUNICATIONS OF THE ACM, 1964, 7 (04) : 242 - 243
  • [5] Sampling binary contingency tables
    Bezakova, Ivona
    COMPUTING IN SCIENCE & ENGINEERING, 2008, 10 (02) : 26 - 31
  • [6] Gardening on pavement, tables, and hard surfaces
    不详
    LANDSCAPE ARCHITECTURE, 2004, 94 (11): : 133 - 133
  • [7] ENTANGLED GAMES ARE HARD TO APPROXIMATE
    Kempe, Julia
    Kobayashi, Hirotada
    Matsumoto, Keiji
    Toner, Ben
    Vidick, Thomas
    SIAM JOURNAL ON COMPUTING, 2011, 40 (03) : 848 - 877
  • [8] Tetris is hard, even to approximate
    Demaine, ED
    Hohenberger, S
    Liben-Nowell, D
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2003, 2697 : 351 - 363
  • [9] Tetris is hard, even to approximate
    Breukelaar, R
    Demaine, ED
    Hohenberger, S
    Hoogeboom, HJ
    Kosters, WA
    Liben-Nowell, D
    INTERNATIONAL JOURNAL OF COMPUTATIONAL GEOMETRY & APPLICATIONS, 2004, 14 (1-2) : 41 - 68
  • [10] Minimal Reachability is Hard To Approximate
    Jadbabaie, Ali
    Olshevsky, Alexander
    Pappas, George J.
    Tzoumas, Vasileios
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (02) : 783 - 789