Skip to main content

Data Privacy against Composition Attack

  • Conference paper
Book cover Database Systems for Advanced Applications (DASFAA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7238))

Included in the following conference series:

Abstract

Data anonymization has become a major technique in privacy preserving data publishing. Many methods have been proposed to anonymize one dataset and a series of datasets of a data holder. However, no method has been proposed for the anonymization scenario of multiple independent data publishing. A data holder publishes a dataset, which contains overlapping population with other datasets published by other independent data holders. No existing methods are able to protect privacy in such multiple independent data publishing. In this paper we propose a new generalization principle (ρ,α)-anonymization that effectively overcomes the privacy concerns for multiple independent data publishing. We also develop an effective algorithm to achieve the (ρ,α)-anonymization. We experimentally show that the proposed algorithm anonymizes data to satisfy the privacy requirement and preserves high quality data utility.

This research has been supported by ARC Discovery grants DP0774450 and DP110103142.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: KDD 2008, pp. 265–273 (2008)

    Google Scholar 

  3. Jiang, W., Clifton, C.: A secure distributed framework for achieving k-anonymity. JVLDB 15, 316–333 (2006)

    Article  Google Scholar 

  4. Jin, X., Zhang, M., Zhang, N., Das, G.: Versatile publishing for privacy preservation. In: KDD 2010, pp. 353–362 (2010)

    Google Scholar 

  5. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE 2006, p. 25 (2006)

    Google Scholar 

  6. Li, J., Wong, R.C.-W., Fu, A.W.-C., Pei, J.: Anonymization by local recoding in data with attribute hierarchical taxonomies. TKDE 20, 1181–1194 (2008)

    Google Scholar 

  7. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and ℓ-diversity. In: ICDE 2007, pp. 106–115 (2007)

    Google Scholar 

  8. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: ℓ-diversity: Privacy beyond k-anonymity. In: TKDD (2007)

    Google Scholar 

  9. Malin, B.: k-unlinkability: A privacy protection model for distributed data. DKE 64(1), 294–311 (2008)

    Article  Google Scholar 

  10. Mohammed, N., Chen, R., Fung, B.C., Yu, P.S.: Differentially private data release for data mining. In: KDD 2011, pp. 493–501. ACM, New York (2011)

    Google Scholar 

  11. Sweeney, L.: k-anonymity: a model for protecting privacy. IJUFKS, 557–570 (2002)

    Google Scholar 

  12. Tao, Y., Xiao, X., Li, J., Zhang, D.: On anti-corruption privacy preserving publication. In: ICDE 2008, pp. 725–734 (2008)

    Google Scholar 

  13. Wong, R.C.-W., Fu, A.W.-C., Wang, K., Pei, J.: Minimality attack in privacy preserving data publishing. In: VLDB 2007, pp. 543–554 (2007)

    Google Scholar 

  14. Wong, R.-W., Fu, A.-C., Liu, J., Wang, K., Xu, Y.: Global privacy guarantee in serial data publishing. In: ICDE 2010, pp. 956–959 (2010)

    Google Scholar 

  15. Xiao, X., Tao, Y.: m-invariance: towards privacy preserving re-publication of dynamic datasets. In: SIGMOD 2007, pp. 689–700 (2007)

    Google Scholar 

  16. Yang, B., Nakagawa, H., Sato, I., Sakuma, J.: Collusion-resistant privacy-preserving data mining. In: KDD 2010, pp. 483–492 (2010)

    Google Scholar 

  17. Yao, C., Wang, X.S., Jajodia, S.: Checking for k-anonymity violation by views. In: VLDB 2005, pp. 910–921 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Baig, M.M., Li, J., Liu, J., Ding, X., Wang, H. (2012). Data Privacy against Composition Attack. In: Lee, Sg., Peng, Z., Zhou, X., Moon, YS., Unland, R., Yoo, J. (eds) Database Systems for Advanced Applications. DASFAA 2012. Lecture Notes in Computer Science, vol 7238. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29038-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29038-1_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29037-4

  • Online ISBN: 978-3-642-29038-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics