Please use this identifier to cite or link to this item: https://doi.org/10.1145/1538909.1538911
DC FieldValue
dc.titleA framework for efficient data anonymization under privacy and accuracy constraints
dc.contributor.authorGhinita, G.
dc.contributor.authorKarras, P.
dc.contributor.authorKalnis, P.
dc.contributor.authorMamoulis, N.
dc.date.accessioned2013-07-04T07:42:38Z
dc.date.available2013-07-04T07:42:38Z
dc.date.issued2009
dc.identifier.citationGhinita, G., Karras, P., Kalnis, P., Mamoulis, N. (2009). A framework for efficient data anonymization under privacy and accuracy constraints. ACM Transactions on Database Systems 34 (2). ScholarBank@NUS Repository. https://doi.org/10.1145/1538909.1538911
dc.identifier.issn03625915
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/39484
dc.description.abstractRecent research studied the problem of publishing microdata without revealing sensitive information, leading to the privacy-preserving paradigms of k-anonymity and l-diversity. k-anonymity protects against the identification of an individual's record. l-diversity, in addition, safeguards against the association of an individual with specific sensitive information. However, existing approaches suffer from at least one of the following drawbacks: (i) l-diversification is solved by techniques developed for the simpler k-anonymization problem, causing unnecessary information loss. (ii) The anonymization process is inefficient in terms of computational and I/O cost. (iii) Previous research focused exclusively on the privacy-constrained problem and ignored the equally important accuracy-constrained (or dual) anonymization problem. In this article, we propose a framework for efficient anonymization of microdata that addresses these deficiencies. First, we focus on one-dimensional (i.e., single-attribute) quasi-identifiers, and study the properties of optimal solutions under the k-anonymity and l-diversity models for the privacy-constrained (i.e., direct) and the accuracy-constrained (i.e., dual) anonymization problems. Guided by these properties, we develop efficient heuristics to solve the one-dimensional problems in linear time. Finally, we generalize our solutions to multidimensional quasi-identifiers using space-mapping techniques. Extensive experimental evaluation shows that our techniques clearly outperform the existing approaches in terms of execution time and information loss. © 2009 ACM.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1538909.1538911
dc.sourceScopus
dc.subjectAnonymity
dc.subjectPrivacy
dc.typeArticle
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1145/1538909.1538911
dc.description.sourcetitleACM Transactions on Database Systems
dc.description.volume34
dc.description.issue2
dc.description.codenATDSD
dc.identifier.isiut000268472600002
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.