Abstract
In this paper we consider a minimum distance Controlled Tabular Adjustment (CTA) model for statistical disclosure limitation (control) of tabular data. The goal of the CTA model is to find the closest safe table to some original tabular data set that contains sensitive information. The measure of closeness is usually measured using \(\ell _1\) or \(\ell _2\) norm; with each measure having its advantages and disadvantages. Recently, in [4] a regularization of the \(\ell _1\)-CTA using Pseudo-Huber function was introduced in an attempt to combine positive characteristics of both \(\ell _1\)-CTA and \(\ell _2\)-CTA. All three models can be solved using appropriate versions of Interior-Point Methods (IPM). It is known that IPM in general works better on well structured problems such as conic optimization problems, thus, reformulation of these CTA models as conic optimization problem may be advantageous. We present reformulation of Pseudo-Huber-CTA, and \(\ell _1\)-CTA as Second-Order Cone (SOC) optimization problems and test the validity of the approach on the small example of two-dimensional tabular data set.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Andersen, E.D.: MOSEK solver (2016). https://mosek.com/resources/doc
Alizadeh, F., Goldfarb, D.: Second-order cone programming. Math. Program. 95(1), 3–51 (2003)
Andersen, E.D., Roos, C., Terlaky, T.: On implementing a primal-dual interior-point method for conic quadratic optimization. Math. Program. 95(2), 249–277 (2003)
Castro, J.: A CTA model based on the huber function. In: Domingo-Ferrer, J. (ed.) PSD 2014. LNCS, vol. 8744, pp. 79–88. Springer, Heidelberg (2014)
Castro, J.: An interior-point approach for primal block-angular problems. Comput. Optim. Appl. 36, 195–219 (2007)
Castro, J.: On assessing the disclosure risk of controlled adjustment methods for statistical tabular data. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 20, 921–941 (2012)
Castro, J.: Minimum-distance controlled perturbation methods for large-scale tabular data protection. Eur. J. Oper. Res. 171, 39–52 (2006)
Castro, J.: Recent advances in optimization techniques for statistical tabular data protection. Eur. J. Oper. Res. 216, 257–269 (2012)
Castro, J., Cuesta, J.: Quadratic regularization in an interior-point method for primal block-angular problems. Math. Program. 130, 415–445 (2011)
Castro, J., Cuesta, J.: Solving \(\ell _1\)-CTA in 3D tables by an interior-point method for primal block-angular problems. TOP 21, 25–47 (2013)
Castro, J., González, J.A.: Assessing the information loss of controlled adjustment methods in two-way tables. In: Domingo-Ferrer, J. (ed.) PSD 2014. LNCS, vol. 8744, pp. 11–23. Springer, Heidelberg (2014)
Castro, J., Gonzalez, J.A.: A fast CTA method without complicating binary decisions. In: Documents of the Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality, Statistics Canada, Ottawa, pp. 1–7 (2013)
Castro, J., Gonzalez, J.A.: A multiobjective LP approach for controlled tabular adjustment in statistical disclosure control. Working paper, Department of Statistics and Operations Research, Universitat Politecnica de Catalunya (2014)
Castro, J., Giessing, S.: Testing variants of minimum distance controlled tabular adjustment. In: Monographs of Official Statistics, Eurostat-Office for Official Publications of the European Communities, Luxembourg, pp. 333–343 (2006)
Dandekar, R.A., Cox, L.H.: Synthetic tabular data: an alternative to complementary cell suppression. Manuscript, Energy Information Administration, U.S. (2002)
Faraut, J., Koranyi, A.: Analysis on Symmetric Cones. Oxford University Press, New York (1994)
Fountoulakis, K., Gondzio, J.: A second-order method for strongly convex L1-regularization problems. Technical report ERGO-14-005, School of Mathematics, The University of Edinburgh (2014)
Gu, G.: Interior-point methods for symmetric optimization. Ph.d. thesis, TU Delft (2009)
Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Schulte Nordholt, E., Spicer, K., De Wolf, P.-P.: Statistical Disclosure Control. Wiley, Chichester (2012)
Karmarkar, N.: A polynomial-time algorithm for linear programming. Combinatorica 4, 373–395 (1984)
Karr, A.F., Kohnen, C.N., Oganian, A., Reiter, J.P., Sanil, A.P.: A framework for evaluating the utility of data altered to protect confidentiality. Am. Stat. 60(3), 224–232 (2006)
Lesaja, G.: Introducing interior-point methods for introductory operations research courses and/or linear programming courses. Open Oper. Res. J. 3, 1–12 (2009)
Lesaja, G., Slaughter, V.: Interior-point algorithms for a class of convex optimization problems. Yugoslav J. Oper. Res. 19(3), 239–248 (2009)
Lesaja, G., Roos, C.: Kernel-based interior-point methods for monotone linear complementarity problems over symmetric cones. J. Optim. Theor. Appl. 150(3), 444–474 (2011)
Ben-Tal, A., Nemirovski, A.: Lectures in Modern Convex Optimization: Analysis, Algorithms and Engineering Applications. MPS/SIAM Series in Optimization. SIAM, Philadelphia (2001)
Nesterov, Y., Nemirovski, A.: Interior-Point Polynomial Algorithms in Convex Programming. SIAM Studies in Applied Mathematics, vol. 13. SIAM, Philadelphia (1994)
Oganian, A.: Security and information loss in statistical database protection. Ph.d. thesis, Universitat Politecnica de Catalunya (2003)
Roos, C., Terlaky, T., Vial, J.P.: Theory and Algorithms for Linear Optimization. An Interior-Point Approach. Springer, Heidelberg (2005)
Wright, S.J.: Primal-Dual Interior-Point Methods. SIAM, Philadelphia (1996)
Acknowledgments
The first author would like to thank Erling Andersen and Florian Jarre for the constructive discussion regarding the SOC model and Iryna Petrenko for her help in performing the calculations described in Sect. 5.
The authors would like to express their appreciation to Donald Malec for his careful reading of the paper and many useful suggestions.
Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors only and do not necessarily reflect the views of the Centers for Disease Control and Prevention.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Lesaja, G., Castro, J., Oganian, A. (2016). A Second Order Cone Formulation of Continuous CTA Model. In: Domingo-Ferrer, J., Pejić-Bach, M. (eds) Privacy in Statistical Databases. PSD 2016. Lecture Notes in Computer Science(), vol 9867. Springer, Cham. https://doi.org/10.1007/978-3-319-45381-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-45381-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45380-4
Online ISBN: 978-3-319-45381-1
eBook Packages: Computer ScienceComputer Science (R0)