Nothing Special   »   [go: up one dir, main page]

Skip to main content

Disclosure Risk Assessment in Perturbative Microdata Protection

  • Chapter
  • First Online:
Inference Control in Statistical Databases

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2316))

Abstract

This paper describes methods for data perturbation that include rank swapping and additive noise. It also describes enhanced methods of re-identification using probabilistic record linkage. The empirical comparisons use variants of the framework for measuring information loss and re-identification risk that were introduced by Domingo-Ferrer and Mateo-Sanz.

This paper reports the results of research and analysis undertaken by Census Bureau staff. It has undergone a Census Bureau review more limited in scope than that given to official Census Bureau publications. This report is released to inform interested parties of research and to encourage discussion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Dempster, A.P., Laird, N.M., and Rubin, D.B.: Maximum Likelihood from Incomplete Data via the EM Algorithm, Journal of the Royal Statistical Society, B, 39 (1977) 1–38.

    MathSciNet  Google Scholar 

  2. Dalenius, T. and Reiss, S.P.: Data-swapping: A Technique for Disclosure Control of Microdata, Journal of Statistical Planning and Inference, 6 (1982) 73–85.

    Article  MATH  MathSciNet  Google Scholar 

  3. De Waal, A.G. and Willenborg, L.C.R.J.: A View on Statistical Disclosure Control of Microdata, Survey Methodology, 22, (1996) 95–103.

    Google Scholar 

  4. DeWaal, A.G. and Willenborg, L.C.R.J.: Optimal Local Suppression in Microdata, Journal of Official Statistics, 14, (1998) 421–435.

    Google Scholar 

  5. Domingo-Ferrer, J., Mateo-Sanz, J., and Torra, V.: Comparing SDC Methods for Microdata on the Basis of Information Loss and Disclosure Risk, Proceedings of ETK-NTTS 2001, (2001) to appear.

    Google Scholar 

  6. Fellegi, I.P. and Sunter, A.B.: A Theory for Record Linkage, Journal of the American Statistical Association, 64, (1969) 1183–1210.

    Article  Google Scholar 

  7. Fuller, W.A.: Masking Procedures for Microdata Disclosure Limitation, Journal of Official Statistics, 9, (1993) 383–406.

    Google Scholar 

  8. Kim, J.J.: A Method for Limiting Disclosure in Microdata Based on Random Noise and Transformation, American Statistical Association, Proceedings of the Section on Survey Research Methods, (1986) 303–308.

    Google Scholar 

  9. Kim, J.J.: Subdomain Estimation for the Masked Data, American Statistical Association, Proceedings of the Section on Survey Research Methods, (1990) 456–461.

    Google Scholar 

  10. Kim, J.J. and Winkler, W.E.: Masking Microdata Files, American Statistical Association, Proceedings of the Section on Survey Research Methods, (1995) 114–119.

    Google Scholar 

  11. Kim, J.J. and Winkler, W.E.: Multiplicative Noise for Masking Continuous Data, American Statistical Association Proceedings of Secure Survey Research Methods, (to appear).

    Google Scholar 

  12. Lambert, D.: Measures of Disclosure Risk and Harm, Journal of Official Statistics, 9, (1993) 313–331.

    Google Scholar 

  13. Moore, R.: Controlled Data Swapping Techniques for Masking Public Use Microdata, U.S. Bureau of the Census, Statistical Research Division Report 96/04 (1996).

    Google Scholar 

  14. Roque, G.M.: Masking Microdata Files with Mixtures of Multivariate Normal Distributions, Unpublished Ph.D. dissertation, Department of Statistics, University of California-Riverside (2000).

    Google Scholar 

  15. Tendick, P. and Matlo., N.: A Modified Random Perturbation Method for Database Security, ACM Transactions on Database Systems, 19, (1994) 47–63.

    Article  Google Scholar 

  16. Winkler, W.E.: Advanced Methods for Record Linkage, American Statistical Association, Proceedings of the Section on Survey Research Methods, (1994) 467–472.

    Google Scholar 

  17. Winkler, W.E.: Matching and Record Linkage, in B.G. Cox (ed.) Business Survey Methods, New York: J. Wiley, (1995) 355–384.

    Google Scholar 

  18. Winkler, W.E.: Re-identification Methods for Evaluating the Confidentiality of Analytically Valid Microdata, Research in Official Statistics, 1, (1998) 87–104

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yancey, W.E., Winkler, W.E., Creecy, R.H. (2002). Disclosure Risk Assessment in Perturbative Microdata Protection. In: Domingo-Ferrer, J. (eds) Inference Control in Statistical Databases. Lecture Notes in Computer Science, vol 2316. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47804-3_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-47804-3_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43614-0

  • Online ISBN: 978-3-540-47804-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics