Abstract
We study the privacy threat by publishing data that contains full functional dependencies (FFDs). We show that the cross-attribute correlations by FFDs can bring potential vulnerability to privacy. Unfortunately, none of the existing anonymization principles can effectively prevent against the FFD-based privacy attack. In this paper, we formalize the FFD-based privacy attack, define the privacy model (d, l)-inference to combat the FFD-based attack, and design robust anonymization algorithm that achieves (d, l)-inference. The efficiency and effectiveness of our approach are demonstrated by the empirical study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Iyengar, V.S.: Transforming Data to Satisfy Privacy Constraints. In: SIGKDD (2002)
Kifer, D.: Attacks on Privacy and deFinetti’s Theorem. In: SIGMOD 2009 (2009)
Li, N., Li, T.: t-Closeness: Privacy Beyond K-anonymity and l-diversity. In: ICDE 2007. Datasets, SIGMOD 2006 (2007)
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity. In: ICDE 2006 (2006)
Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.Y.: Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. In: ICDE 2007 (2007)
Rastogi, V., Suciu, D., Hong, S.: The boundary between privacy and utility in data publishing. In: VLDB 2007 (2007)
Samarati, P., Sweeney, L.: Generalizing Data to Provide Anonymity when Disclosing Information. In: PODS (1998)
Samarati, P.: Protecting Respondents’ Identities in Microdata Release. In: TKDE (2001)
Sweeney, L.: K-anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557570 (2002)
Tao, Y., Pei, J., Li, J., Xiao, X., Yi, K., Xing, Z.: Hiding Correlation by Independence Masking. In: ICDE 2010 (2010)
Wong, R.C., Li, J., Fu, A.W., Wang, K.: (α, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy-Preserving Data Publishing. In: SIGKDD (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, H.(., Liu, R. (2010). Privacy-Preserving Publishing Data with Full Functional Dependencies. In: Kitagawa, H., Ishikawa, Y., Li, Q., Watanabe, C. (eds) Database Systems for Advanced Applications. DASFAA 2010. Lecture Notes in Computer Science, vol 5982. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12098-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-12098-5_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12097-8
Online ISBN: 978-3-642-12098-5
eBook Packages: Computer ScienceComputer Science (R0)