Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/39530
DC FieldValue
dc.titleρ-uncertainty: Inferenceproof transaction anonymization
dc.contributor.authorCao, J.
dc.contributor.authorKarras, P.
dc.contributor.authorRaïssi, C.
dc.contributor.authorTan, K.
dc.date.accessioned2013-07-04T07:43:41Z
dc.date.available2013-07-04T07:43:41Z
dc.date.issued2010
dc.identifier.citationCao, J.,Karras, P.,Raïssi, C.,Tan, K. (2010). ρ-uncertainty: Inferenceproof transaction anonymization. Proceedings of the VLDB Endowment 3 (1) : 1033-1044. ScholarBank@NUS Repository.
dc.identifier.issn21508097
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/39530
dc.description.abstractThe publication of transaction data, such as market basket data, medical records, and query logs, serves the public benefit. Mining such data allows for the derivation of association rules that connect certain items to others with measurable confidence. Still, this type of data analysis poses a privacy threat; an adversary having partial information on a person's behavior may confidently associate that person to an item deemed to be sensitive. Ideally, an anonymization of such data should lead to an inference-proof version that prevents the association of individuals to sensitive items, while otherwise allowing for truthful associations to be derived. Original approaches to this problem were based on value perturbation, damaging data integrity. Recently, value generalization has been proposed as an alternative; still, approaches based on it have assumed either that all items are equally sensitive, or that some are sensitive and can be known to an adversary only by association, while others are non-sensitive and can be known directly. Yet in reality there is a distinction between sensitive and non-sensitive items, but an adversary may possess information on any of them. Most critically, no antecedent method aims at a clear inference-proof privacy guarantee. In this paper, we propose ρ-uncertainty, the first, to our knowledge, privacy concept that inherently safeguards against sensitive associations without constraining the nature of an adversary's knowledge and without falsifying data. The problem of achieving ρ-uncertainty with low information loss is challenging because it is natural. A trivial solution is to suppress all sensitive items. We develop more sophisticated schemes. In a broad experimental study, we show that the problem is solved non-trivially by a technique that combines generalization and suppression, which also achieves favorable results compared to a baseline perturbation-based scheme. © 2010 VLDB Endowment.
dc.sourceScopus
dc.typeArticle
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.sourcetitleProceedings of the VLDB Endowment
dc.description.volume3
dc.description.issue1
dc.description.page1033-1044
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.