Efficient and flexible anonymization of transaction data

被引:0
|
作者
Grigorios Loukides
Aris Gkoulalas-Divanis
Jianhua Shao
机构
[1] Cardiff University,School of Computer Science and Informatics
[2] IBM Research-Ireland,Smarter Cities Technology Centre
来源
关键词
Anonymity; Privacy; Transaction data; Privacy requirements; Identity disclosure; Sensitive information disclosure; Efficiency; Scalability;
D O I
暂无
中图分类号
学科分类号
摘要
Transaction data are increasingly used in applications, such as marketing research and biomedical studies. Publishing these data, however, may risk privacy breaches, as they often contain personal information about individuals. Approaches to anonymizing transaction data have been proposed recently, but they may produce excessively distorted and inadequately protected solutions. This is because these approaches do not consider privacy requirements that are common in real-world applications in a realistic and flexible manner, and attempt to safeguard the data only against either identity disclosure or sensitive information inference. In this paper, we propose a new approach that overcomes these limitations. We introduce a rule-based privacy model that allows data publishers to express fine-grained protection requirements for both identity and sensitive information disclosure. Based on this model, we also develop two anonymization algorithms. Our first algorithm works in a top-down fashion, employing an efficient strategy to recursively generalize data with low information loss. Our second algorithm uses sampling and a combination of top-down and bottom-up generalization heuristics, which greatly improves scalability while maintaining low information loss. Extensive experiments show that our algorithms significantly outperform the state-of-the-art in terms of retaining data utility, while achieving good protection and scalability.
引用
收藏
页码:153 / 210
页数:57
相关论文
共 50 条
  • [21] Efficient transaction processing in mobile data broadcast environments
    Lee, SK
    Kim, SS
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2004, 2973 : 750 - 761
  • [22] Spectral Anonymization of Data
    Lasko, Thomas A.
    Vinterbo, Staal A.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2010, 22 (03) : 437 - 446
  • [23] A study on the management of semantic transaction for efficient data retrieval
    Huang, SM
    Kwan, I
    Li, CH
    SIGMOD RECORD, 2002, 31 (03) : 28 - 33
  • [24] Flexible Anonymization of Transactions with Sensitive Items
    Tsai, Yu-Chuan
    Wang, Shyue-Liang
    Ting, I-Hsien
    Hong, Tzung-Pei
    2018 5TH INTERNATIONAL CONFERENCE ON BEHAVIORAL, ECONOMIC, AND SOCIO-CULTURAL COMPUTING (BESC), 2018, : 201 - 206
  • [25] Distributed Data Anonymization
    SheikhAlishahi, Mina
    Martinelli, Fabio
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 580 - 586
  • [26] On Anonymization of String Data
    Aggarwal, Charu C.
    Yu, Philip S.
    PROCEEDINGS OF THE SEVENTH SIAM INTERNATIONAL CONFERENCE ON DATA MINING, 2007, : 419 - 424
  • [27] Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss
    Sakpere, Aderonke Busayo
    Kayem, Anne V. D. M.
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 191 - 201
  • [28] k-NDDP: An Efficient Anonymization Model for Social Network Data Release
    Shakeel, Shafaq
    Anjum, Adeel
    Asheralieva, Alia
    Alam, Masoom
    ELECTRONICS, 2021, 10 (19)
  • [29] A scalable and flexible basket analysis system for big transaction data in Spark
    Sun, Xudong
    Ngueilbaye, Alladoumbaye
    Luo, Kaijing
    Cai, Yongda
    Wu, Dingming
    Huang, Joshua Zhexue
    INFORMATION PROCESSING & MANAGEMENT, 2024, 61 (02)
  • [30] PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, 2014, 8708 : 211 - +