Please use this identifier to cite or link to this item:
https://doi.org/10.1145/1538909.1538911
DC Field | Value | |
---|---|---|
dc.title | A framework for efficient data anonymization under privacy and accuracy constraints | |
dc.contributor.author | Ghinita, G. | |
dc.contributor.author | Karras, P. | |
dc.contributor.author | Kalnis, P. | |
dc.contributor.author | Mamoulis, N. | |
dc.date.accessioned | 2013-07-04T07:42:38Z | |
dc.date.available | 2013-07-04T07:42:38Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N. (2009). A framework for efficient data anonymization under privacy and accuracy constraints. ACM Transactions on Database Systems 34 (2). ScholarBank@NUS Repository. https://doi.org/10.1145/1538909.1538911 | |
dc.identifier.issn | 03625915 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/39484 | |
dc.description.abstract | Recent research studied the problem of publishing microdata without revealing sensitive information, leading to the privacy-preserving paradigms of k-anonymity and l-diversity. k-anonymity protects against the identification of an individual's record. l-diversity, in addition, safeguards against the association of an individual with specific sensitive information. However, existing approaches suffer from at least one of the following drawbacks: (i) l-diversification is solved by techniques developed for the simpler k-anonymization problem, causing unnecessary information loss. (ii) The anonymization process is inefficient in terms of computational and I/O cost. (iii) Previous research focused exclusively on the privacy-constrained problem and ignored the equally important accuracy-constrained (or dual) anonymization problem. In this article, we propose a framework for efficient anonymization of microdata that addresses these deficiencies. First, we focus on one-dimensional (i.e., single-attribute) quasi-identifiers, and study the properties of optimal solutions under the k-anonymity and l-diversity models for the privacy-constrained (i.e., direct) and the accuracy-constrained (i.e., dual) anonymization problems. Guided by these properties, we develop efficient heuristics to solve the one-dimensional problems in linear time. Finally, we generalize our solutions to multidimensional quasi-identifiers using space-mapping techniques. Extensive experimental evaluation shows that our techniques clearly outperform the existing approaches in terms of execution time and information loss. © 2009 ACM. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1538909.1538911 | |
dc.source | Scopus | |
dc.subject | Anonymity | |
dc.subject | Privacy | |
dc.type | Article | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1145/1538909.1538911 | |
dc.description.sourcetitle | ACM Transactions on Database Systems | |
dc.description.volume | 34 | |
dc.description.issue | 2 | |
dc.description.coden | ATDSD | |
dc.identifier.isiut | 000268472600002 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.