Skip to main content

Distributed Anonymization for Multiple Data Providers in a Cloud System

  • Conference paper
Database Systems for Advanced Applications (DASFAA 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7825))

Included in the following conference series:

Abstract

With the proliferation of cloud computing, there is an increasing need for sharing data repositories containing personal information across multiple distributed databases, and such data sharing is subject to different privacy constraints of multiple individuals. Most of the existing methods focus on single database anonymization, although the concept of distributed anonymization was discussed in some literatures, it only provides an uniform approach that exerts the same amount of preservation for all data providers, without catering for user’s specific privacy requirements. The consequence is that we may offer insufficient protection to a subset of people, while applying excessive privacy budget to the others. Motivated by this, we present a new distributed anonymization protocol based on the concept of personalized privacy preservation. Our technique performs a personalized anonymization to satisfy multiple data provider’s privacy requirements, and then publish their global anonymization view without any privacy breaches. Extensive experiments have been conducted to verify that our proposed protocol and anonymization method are efficient and effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Vaquero, L.M., Merino, L.R., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. In: ACM SIGCOMM, pp. 50–55 (2009)

    Google Scholar 

  2. AMAZON. Nimbus health, http://aws.amazon.com/solutions/case-studies/nimbus-health/

  3. AMAZON. Nimbus health, http://aws.amazon.com/solutions/case-studies/sharethis/

  4. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: INFOCOM (2010)

    Google Scholar 

  5. Jurczyk, P., Xiong, L.: Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security 2009. LNCS, vol. 5645, pp. 191–207. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: INFOCOM (2010)

    Google Scholar 

  7. Xiao, Y., Lin, C., Jiang, Y., Chuang, X., Liu, F.: An Efficient Privacy-Preserving Publish-Subscribe Service Scheme for Cloud Computing. In: GLOBECOM (2010)

    Google Scholar 

  8. Cao, N., Yang, Z., Wang, C., Ren, K., Lou, W.: Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing. In: ICDCS (2011)

    Google Scholar 

  9. Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In: Proc. of ACM Conference on CCS, pp. 199–212 (2009)

    Google Scholar 

  10. Kamara, S., Lauter, K.: Cryptographic cloud storage. In: RLCPS (2010)

    Google Scholar 

  11. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. (2002)

    Google Scholar 

  12. Wong, R., Li, J., Wai-Chee Fu, A., Wang, K.: (a, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: KDD (2006)

    Google Scholar 

  13. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. TKDD (2007)

    Google Scholar 

  14. Xiao, X., Tao, Y.: m-Invariance: Towards Privacy Preserving Re-publication of Dynamic Datasets. In: SIGMOD (2007)

    Google Scholar 

  15. Bu, Y., Fu, A.W.C., Wong, R.C.W., Chen, L., Li, J.: Privacy Preserving Serial Data Publishing By Role Composition. In: VLDB (2008)

    Google Scholar 

  16. Xiao, X., Wang, G., Gehrke, J.: Differential Privacy via Wavelet Transforms. In: ICDE (2010)

    Google Scholar 

  17. Baig, M., Li, J., Liu, J., Wang, H.: Cloning for Privacy Protection in Multiple Independent Data Publications. In: ACM CIKM (2011)

    Google Scholar 

  18. Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy Preserving Query Processing using Third Parties. In: ICDE (2006)

    Google Scholar 

  19. Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE (2005)

    Google Scholar 

  20. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: SIGMOD (2005)

    Google Scholar 

  21. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems (2002)

    Google Scholar 

  22. Xiao, X., Tao, Y.: Personalized Privacy Preservation. In: SIGMOD (2006)

    Google Scholar 

  23. Guttman, A.: R-trees: a dynamic index structure for spatial searching. In: SIGMOD (1984)

    Google Scholar 

  24. Tao, Y., Papadias, D., Sun, J.: The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries. In: VLDB (2003)

    Google Scholar 

  25. Fung, B., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, CSUR (2010)

    Google Scholar 

  26. Jiang, W., Clifton, C.: A secure distributed framework for achieving k-anonymity. VLDB Journal (2006)

    Google Scholar 

  27. Zhong, S., Yang, Z., Wright, R.N.: Privacy-enhancing k-anonymization of customer data. In: PODS (2005)

    Google Scholar 

  28. Lindell, Y., Pinkas, B.: Secure multipart computation for privacy-preserving data mining. Cryptology ePrint Archive Report, http://eprint.iacr.org

  29. LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: IEEE ICDE (2006)

    Google Scholar 

  30. Li, N., Li, T., Suresh, V.: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In: IEEE ICDE (2007)

    Google Scholar 

  31. Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: ACM SIGKDD (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ding, X., Yu, Q., Li, J., Liu, J., Jin, H. (2013). Distributed Anonymization for Multiple Data Providers in a Cloud System. In: Meng, W., Feng, L., Bressan, S., Winiwarter, W., Song, W. (eds) Database Systems for Advanced Applications. DASFAA 2013. Lecture Notes in Computer Science, vol 7825. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37487-6_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37487-6_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37486-9

  • Online ISBN: 978-3-642-37487-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics