Browse > Article
http://dx.doi.org/10.13089/JKIISC.2011.21.5.149

A study on the algorithms to achieve the data privacy based on some anonymity measures  

Kang, Ju-Sung (Kookmin University)
Kang, Jin-Young (Kookmin University)
Yi, Ok-Yeon (Kookmin University)
Hong, Do-Won (ETRI)
Abstract
Technique based on the notions of anonymity is one of several ways to achieve the goal of privacy and it transforms the original data into the micro data by some group based methods. The first notion of group based method is ${\kappa}$-anonymity, and it is enhanced by the notions of ${\ell}$-diversity and t-closeness. Since there is the natural tradeoff between privacy and data utility, the development of practical anonymization algorithms is not a simple work and there is still no noticeable algorithm which achieves some combined anonymity conditions. In this paper, we provides a comparative analysis of previous anonymity and accuracy measures. Moreover we propose an algorithm to achieve ${\ell}$-diversity by the block merging method from a micro-data achieving ${\kappa}$-anonymity.
Keywords
Privacy; Accuracy; ${\kappa}$-anonymity; ${\ell}$-divcrsity; t-closeness.;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Duncan, "State of the Art: An Overview of Policy and Practice on Release of Microdata," www.heinz.cmu.edu/research/32full.pdf, 2002.
2 L. Sweeney "$\kappa$-anonymity : A model for protection privacy," International Journal of Uncertainty, Fuzziness and Knowledge-based systems, Vol. 10, No. 5, pp. 557-570, October 2002.   DOI   ScienceOn
3 A. Machanavajjhala, J. Gehrke, and D. Kifer, "$\ell$-diversity: Privacy beyond $\kappa$-anonymity," Proceedings of the International Conference on Data Engineering (ICDE2006), pp. 24-35, April 2006.
4 T. Li, N. Li, and S. Venkatasubramanian, "t-closeness: Privacy beyond $\kappa$-anonymity and $\ell$-diversity," Proceedings of the International Conference on Data Engineering( ICDE2006), pp. 106-115, April 2006.
5 L. Sweeny, "Achieving k-anonymity privacy protection using Generalization and suppression," International Journal of Uncertainty, Fuzziness and Knowledge-based systems, pp.571-588, October 2002.
6 B. Fung, K. Wang, and P. Yu, "Top-Down Specialization for information and privacy preservation," Proceedings of the 21st IEEE International Conference on Data Engineering, pp.205-216, April 2005.
7 T. Truta and V. Bindu, "Privacy Protection: P-Sensitive K-Anonymity Property," Proceedings of the Workshop on Privacy Data Management, In Conjunction with 22th IEEE International Conference of Data Engineering (ICDE), Atlanta, Georgia, April 2006.
8 R. Bayardo and R. Agrawal, "Data Privacy through Optimal k-Anonymization," 21st International Conference on Data Engineering (ICDE'05), pp. 217-228, April 2005.
9 L. Sweeney, "Guaranteeing anonymity when sharing medical data, the Datafly system," Proceedings of the American Medical Informatics Association Annu. Fall Symp., http://dataprivacylab.org/datafly/paper4.pdf, February 1997.
10 A. Hundepool and L. Willenborg, $\mu^{-}$"- and $\tau$-argus: software for statistical disclosure control," Third International Seminar on Statistical Confidentiality, pp. 142-149, November 1996.