Skip to main content

Privacy-Preserving Publishing Data with Full Functional Dependencies

  • Conference paper
Database Systems for Advanced Applications (DASFAA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5982))

Included in the following conference series:

Abstract

We study the privacy threat by publishing data that contains full functional dependencies (FFDs). We show that the cross-attribute correlations by FFDs can bring potential vulnerability to privacy. Unfortunately, none of the existing anonymization principles can effectively prevent against the FFD-based privacy attack. In this paper, we formalize the FFD-based privacy attack, define the privacy model (d, l)-inference to combat the FFD-based attack, and design robust anonymization algorithm that achieves (d, l)-inference. The efficiency and effectiveness of our approach are demonstrated by the empirical study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Iyengar, V.S.: Transforming Data to Satisfy Privacy Constraints. In: SIGKDD (2002)

    Google Scholar 

  2. Kifer, D.: Attacks on Privacy and deFinetti’s Theorem. In: SIGMOD 2009 (2009)

    Google Scholar 

  3. Li, N., Li, T.: t-Closeness: Privacy Beyond K-anonymity and l-diversity. In: ICDE 2007. Datasets, SIGMOD 2006 (2007)

    Google Scholar 

  4. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity. In: ICDE 2006 (2006)

    Google Scholar 

  5. Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.Y.: Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. In: ICDE 2007 (2007)

    Google Scholar 

  6. Rastogi, V., Suciu, D., Hong, S.: The boundary between privacy and utility in data publishing. In: VLDB 2007 (2007)

    Google Scholar 

  7. Samarati, P., Sweeney, L.: Generalizing Data to Provide Anonymity when Disclosing Information. In: PODS (1998)

    Google Scholar 

  8. Samarati, P.: Protecting Respondents’ Identities in Microdata Release. In: TKDE (2001)

    Google Scholar 

  9. Sweeney, L.: K-anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557570 (2002)

    Google Scholar 

  10. Tao, Y., Pei, J., Li, J., Xiao, X., Yi, K., Xing, Z.: Hiding Correlation by Independence Masking. In: ICDE 2010 (2010)

    Google Scholar 

  11. Wong, R.C., Li, J., Fu, A.W., Wang, K.: (α, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy-Preserving Data Publishing. In: SIGKDD (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H.(., Liu, R. (2010). Privacy-Preserving Publishing Data with Full Functional Dependencies. In: Kitagawa, H., Ishikawa, Y., Li, Q., Watanabe, C. (eds) Database Systems for Advanced Applications. DASFAA 2010. Lecture Notes in Computer Science, vol 5982. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12098-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12098-5_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12097-8

  • Online ISBN: 978-3-642-12098-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics