Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/39530
Title: | ρ-uncertainty: Inferenceproof transaction anonymization | Authors: | Cao, J. Karras, P. Raïssi, C. Tan, K. |
Issue Date: | 2010 | Citation: | Cao, J.,Karras, P.,Raïssi, C.,Tan, K. (2010). ρ-uncertainty: Inferenceproof transaction anonymization. Proceedings of the VLDB Endowment 3 (1) : 1033-1044. ScholarBank@NUS Repository. | Abstract: | The publication of transaction data, such as market basket data, medical records, and query logs, serves the public benefit. Mining such data allows for the derivation of association rules that connect certain items to others with measurable confidence. Still, this type of data analysis poses a privacy threat; an adversary having partial information on a person's behavior may confidently associate that person to an item deemed to be sensitive. Ideally, an anonymization of such data should lead to an inference-proof version that prevents the association of individuals to sensitive items, while otherwise allowing for truthful associations to be derived. Original approaches to this problem were based on value perturbation, damaging data integrity. Recently, value generalization has been proposed as an alternative; still, approaches based on it have assumed either that all items are equally sensitive, or that some are sensitive and can be known to an adversary only by association, while others are non-sensitive and can be known directly. Yet in reality there is a distinction between sensitive and non-sensitive items, but an adversary may possess information on any of them. Most critically, no antecedent method aims at a clear inference-proof privacy guarantee. In this paper, we propose ρ-uncertainty, the first, to our knowledge, privacy concept that inherently safeguards against sensitive associations without constraining the nature of an adversary's knowledge and without falsifying data. The problem of achieving ρ-uncertainty with low information loss is challenging because it is natural. A trivial solution is to suppress all sensitive items. We develop more sophisticated schemes. In a broad experimental study, we show that the problem is solved non-trivially by a technique that combines generalization and suppression, which also achieves favorable results compared to a baseline perturbation-based scheme. © 2010 VLDB Endowment. | Source Title: | Proceedings of the VLDB Endowment | URI: | http://scholarbank.nus.edu.sg/handle/10635/39530 | ISSN: | 21508097 |
Appears in Collections: | Staff Publications |
Show full item record
Files in This Item:
There are no files associated with this item.
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.