Abstract
We present a sound data-value-dependent method of detecting privacy violations in the context of multiple views publishing. We assume that privacy violation takes the form of linkages, that is, identifier-privacy value pair appearing in the same data record. At first, we perform a theoretical study of the following security problem: given a set of views to be published, if linking of two views does not violate privacy, how about three or more of them? And how many potential leaking channels are there? Then we propose a pre-processing algorithm of views which can turn multi-view violation detection problem into the single view case. Next, we build a benchmark with publicly available data set, Adult Database, at the UC Irvine Machine Learning Repository, and identity data set generated using a coherent database generator called Fake Name Generator on the internet. Finally, we conduct some experiments via Cayuga complex event processing system, the results demonstrate that our approach is practical, and well-suited to efficient privacy-violation detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cao, J., Carminati, B., Ferrari, E., Tan, K.-L.: Castle: A delay-constrained scheme for ks-anonymizing data streams. In: ICDE, pp. 1376–1378 (2008)
Demers, A., Gehrke, J., Cayuga, B.P.: A general purpose event monitoring system. In: CIDR, pp. 412–422 (2007)
Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42(4), 1–53 (2010)
Kifer, D., Gehrke, J.: l-diversity: Privacy beyond k-anonymity. In: ICDE 2006: Proceedings of the 22nd International Conference on Data Engineering, p. 24 (2006)
Li, J., Ooi, B.C., Wang, W.: Anonymizing streaming data for privacy protection. In: ICDE 2008: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, pp. 1367–1369. IEEE Computer Society, Washington, DC (2008)
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE (2007)
Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. In: SIGMOD 2004: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 575–586. ACM, New York (2004)
Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. Technical report (March 1998)
Vincent, M.W., Mohania, M., Iwaihara, M.: Detecting privacy violations in database publishing using disjoint queries. In: EDBT 2009: Proceedings of the 12th International Conference on Extending Database Technology, pp. 252–262. ACM, New York (2009)
Wang, W., Li, J., Ai, C., Li, Y.: Privacy protection on sliding window of data streams. In: COLCOM 2007: Proceedings of the 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 213–221. IEEE Computer Society, Washington, DC (2007)
Yao, C., Wang, X.S., Jajodia, S.: Checking for k-anonymity violation by views. In: VLDB 2005: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 910–921. VLDB Endowment (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dou, D., Coulondre, S. (2012). Detecting Privacy Violations in Multiple Views Publishing. In: Liddle, S.W., Schewe, KD., Tjoa, A.M., Zhou, X. (eds) Database and Expert Systems Applications. DEXA 2012. Lecture Notes in Computer Science, vol 7447. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32597-7_46
Download citation
DOI: https://doi.org/10.1007/978-3-642-32597-7_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32596-0
Online ISBN: 978-3-642-32597-7
eBook Packages: Computer ScienceComputer Science (R0)