A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization

被引:20
|
作者
Fouad, Mohamed R. [1 ]
Elbassioni, Khaled [2 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Max Planck Inst Informat, D-66123 Saarbrucken, Germany
关键词
Differential privacy; security; risk management; data sharing; data utility; anonymity; scalability;
D O I
10.1109/TKDE.2013.107
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Maximizing data usage and minimizing privacy risk are two conflicting goals. Organizations always apply a set of transformations on their data before releasing it. While determining the best set of transformations has been the focus of extensive work in the database community, most of this work suffered from one or both of the following major problems: scalability and privacy guarantee. Differential Privacy provides a theoretical formulation for privacy that ensures that the system essentially behaves the same way regardless of whether any individual is included in the database. In this paper, we address both scalability and privacy risk of data anonymization. We propose a scalable algorithm that meets differential privacy when applying a specific random sampling. The contribution of the paper is two-fold: 1) we propose a personalized anonymization technique based on an aggregate formulation and prove that it can be implemented in polynomial time; and 2) we show that combining the proposed aggregate formulation with specific sampling gives an anonymization algorithm that satisfies differential privacy. Our results rely heavily on exploring the supermodularity properties of the risk function, which allow us to employ techniques from convex optimization. Through experimental studies we compare our proposed algorithm with other anonymization schemes in terms of both time and privacy risk.
引用
收藏
页码:1591 / 1601
页数:11
相关论文
共 50 条
  • [21] Anonymization of Network Traces Data through Condensation-based Differential Privacy
    Aleroud A.
    Yang F.
    Pallaprolu S.C.
    Chen Z.
    Karabatis G.
    Digital Threats: Research and Practice, 2021, 2 (04):
  • [22] Privacy Preserving BIRCH Algorithm under Differential Privacy
    Zhang, Yao
    Li, Shuyu
    2017 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2017), 2017, : 48 - 53
  • [23] A-PAM Clustering Algorithm Based on Differential Privacy Preserving
    Shao, Rong-min
    Zhang, Lin
    Liu, Yan
    Huang, Da-guang
    2015 INTERNATIONAL CONFERENCE ON SOFTWARE, MULTIMEDIA AND COMMUNICATION ENGINEERING (SMCE 2015), 2015, : 183 - 190
  • [24] Density Peak Clustering Algorithm Based on Differential Privacy Preserving
    Chen, Yun
    Du, Yunlan
    Cao, Xiaomei
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 20 - 32
  • [25] Face Recognition System Based on Differential Privacy Preserving Algorithm
    School of Data and Information, Changjiang Polytechnic, Wuhan
    430074, China
    Int. J. Netw. Secur., 6 (934-942): : 934 - 942
  • [26] Privacy preserving data anonymization of spontaneous ADE reporting system dataset
    Lin, Wen-Yang
    Yang, Duen-Chuan
    Wang, Jie-Teng
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2016, 16
  • [27] An anonymization protocol for continuous and dynamic privacy-preserving data collection
    Kim, Soohyung
    Chung, Yon Dohn
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 1065 - 1073
  • [28] Toward Scalable Anonymization for Privacy-Preserving Big Data Publishing
    Mehta, Brijesh B.
    Rao, Udai Pratap
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 297 - 304
  • [29] Selective Feature Anonymization for Privacy-Preserving Image Data Publishing
    Kim, Taehoon
    Yang, Jihoon
    ELECTRONICS, 2020, 9 (05)
  • [30] Privacy Preserving Big data Using Combine Anonymization and Encryption Approach
    Desai, Vidhi
    Chauhan, Gargi K.
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,