A Mondrian-based Utility Optimization Model for Anonymization

被引:0
|
作者
Canbay, Yavuz [1 ]
Sagiroglu, Seref [1 ]
Vural, Yilmaz [2 ]
机构
[1] Gazi Univ, Dept Comp Engn, Ankara, Turkey
[2] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
关键词
Anonymization; Mondrian; outliers; utility optimization; PRIVACY;
D O I
10.1109/ubmk.2019.8907117
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Anonymization is a privacy-preserving approach facilitating to protect the identities of data subjects. Besides privacy, anonymization presents a data utility that is very important for data analytics. The accuracy of a data analytics model, which is created on anonymous data, depends on the utility provided by anonymization. While there exist some factors directly affecting data utility such as privacy level, anonymization operators, anonymization algorithm, etc. Recent studies presented that outliers are another factor that affects data utility too. In the anonymization domain, outliers are accepted as "a group of data that decreases total data utility". In this paper, in order to maximize the data utility, a new data utility model is proposed and applied to Mondrian for the first time. A general outlier-based utility evaluation function is also introduced to measure this utility for the first time. Experimental results have shown that the proposed model improves data utility and presents higher utility than Mondrian. The proposed function might be also used as a reliable tool for outlier-based utility-aware anonymization models.
引用
收藏
页码:709 / 714
页数:6
相关论文
共 50 条
  • [41] Anonymization on Refining Partition: Same Privacy, More Utility
    Zhu, Hong
    Tian, Shengli
    Xie, Meiyi
    2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2014, : 998 - 1005
  • [42] Preserving Both Privacy and Utility in Network Trace Anonymization
    Mohammady, Meisam
    Wang, Lingyu
    Hong, Yuan
    Louafi, Habib
    Pourzandi, Makan
    Debbabi, Mourad
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 459 - 474
  • [43] MR-Anonymization: A Relationship-based Privacy Model
    Almohaimeed, Abdulrahman
    Gampa, Srikanth
    2019 JOINT 8TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2019 3RD INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR) WITH INTERNATIONAL CONFERENCE ON ACTIVITY AND BEHAVIOR COMPUTING (ABC), 2019, : 243 - 248
  • [44] Anonymization on Refining Partition: Same Privacy, More Utility
    Zhu, Hong
    Tian, Shengli
    Du, Genyuan
    Xie, Meiyi
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 12 (04) : 1193 - 1216
  • [45] Evaluation of the Anonymity and Utility of De-Identified Clinical Data Based on Japanese Anonymization Criteria
    Kimura, Eizen
    Hasegawa, Satoshi
    Chida, Koji
    Gamo, Shoko
    Irino, Satoshi
    Ishida, Haku
    Kurihara, Yukio
    MEDINFO 2017: PRECISION HEALTHCARE THROUGH INFORMATICS, 2017, 245 : 1303 - 1303
  • [46] Vector Space Model Anonymization
    Abril, Daniel
    Navarro-Arribas, Guillermo
    Torra, Vicenc
    ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE OF THE CATALAN ASSOCIATION FOR ARTIFICIAL INTELLIGENCE, 2013, 256 : 141 - 150
  • [47] Service utility optimization model based on user preferences in multiservice IP networks
    Derbel, Hajer
    Agoulmine, Nazim
    Salaun, Mikael
    2007 IEEE GLOBECOM WORKSHOPS, PROCEEDINGS, 2007, : 121 - +
  • [48] Utility preserving query log anonymization via semantic microaggregation
    Batet, Montserrat
    Erola, Arnau
    Sanchez, David
    Castella-Roca, Jordi
    INFORMATION SCIENCES, 2013, 242 : 49 - 63
  • [49] High utility K-anonymization for social network publishing
    Yazhe Wang
    Long Xie
    Baihua Zheng
    Ken C. K. Lee
    Knowledge and Information Systems, 2014, 41 : 697 - 725
  • [50] An Anonymization Algorithm for (α,β,γ,δ)-Social Network Privacy Considering Data Utility
    Rajaei, Mehri
    Haghjoo, Mostafa S.
    Miyaneh, Eynollah Khanjari
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (02) : 268 - 305