Abstract
In k-anonymity modeling process, it is widely assumed that a relational table of microdata is published with a single sensitive attribute. This assumption is too simple and unreasonable. We observe that multiple sensitive attributes in one or more tables may incur privacy inference violations that are not visible under the single sensitive attribute assumption. In this paper, a new (k, ℓ)-anonymity model is introduced beyond the existed ℓ-diversity mechanism, which is an improved microdata publication model that can effectively prevent these multiple-attributed privacy violations. The (k, ℓ)-anonymity process consists of two phases: k-anonymization on identifying attributes and ℓ-diversity on sensitive attributes. The related (k, ℓ)-anonymity algorithms are proposed and the data generalization metric is provided for minimizing the anonymization cost. A running example illustrates this technique in detail, which also convinces its effectiveness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aggarwal, G., Feder, T., et al.: Anonymizing Tables for Privacy Protection (2004), http://theory.standford.edu/~rajeev/privacy.html
Aggarwal, G., Feder, T., et al.: Approximation Algorithms for K-Anonymity. Journal of Privacy Technology (November 2005)
Aggarwal, G., Feder, T., et al.: Injecting Utility into Anonymized Datasets. In: Proc. of PODS 2006, June 2006, pp. 153–163 (2006)
Kifer, D., Gehrke, J.: Injecting Utility into Anonymized Datasets. In: Proc. of SIGMOD 2006, June 2006, pp. 217–229 (2006)
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Multidimensional K-Anonymity. Technical Report (2005), www.cs.wisc.edu/techreports/2005/
Lefevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-Domain K-Anonymity. In: Proc. of SIGMOD 2005 (June 2005)
Li, Z., Zhan, G., Ye, X.: Towards a More Reasonable Generalization Cost Metric For K-Anonymization. In: Bell, D.A., Hong, J. (eds.) BNCOD 2006. LNCS, vol. 4042, Springer, Heidelberg (2006)
Li, Z., Zhan, G., Ye, X.: Towards a Microdata Anonymization Model with Individual-Defined Ks. In: Bressan, S., Küng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol. 4080, pp. 883–893. Springer, Heidelberg (2006)
Machanavajjhala, A., Gehrke, J., Kifer, D.: ℓ-Diversity: Privacy Beyond K-Anonymity. In: Proc. of ICDE 2006 (2006)
Meyerson, A., Williams, R.: On the Complexity of Optimal K-Anonymity. In: Proc. of PODS 2004 (2004)
Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression, Technical Report, SRI Computer Science Lab. (1998)
Sweeney, L.: Achieving K-Anonymity Privacy Protection Using Generalization and Suppression. Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 571–588 (2002)
Sweeney, L.: K-Anonymity: A Model For Protecting Privacy. Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)
Yao, C., Wang, X.S., Jajodia, S.: Checking for K-Anonymity Violation by Views. In: Proc. of VLDB 2005 (2005)
Ye, X., Li, Z., Li, Y.: Capture Inference Attacks for K-Anonymity with Privacy Inference Logic. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dong, Y., Li, Z., Ye, X. (2008). Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds) Progress in WWW Research and Development. APWeb 2008. Lecture Notes in Computer Science, vol 4976. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78849-2_28
Download citation
DOI: https://doi.org/10.1007/978-3-540-78849-2_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78848-5
Online ISBN: 978-3-540-78849-2
eBook Packages: Computer ScienceComputer Science (R0)