Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1871437.1871628acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
poster

Anonymizing data with quasi-sensitive attribute values

Published: 26 October 2010 Publication History

Abstract

We study the problem of anonymizing data with quasi-sensitive attributes. Quasi-sensitive attributes are not sensitive by themselves, but certain values or their combinations may be linked to external knowledge to reveal indirect sensitive information of an individual. We formalize the notion of l-diversity and t-closeness for quasi-sensitive attributes, which we call QS l-diversity and QS t-closeness, to prevent indirect sensitive attribute disclosure. We propose a two-phase anonymization algorithm that combines quasi-identifying value generalization and quasi-sensitive value suppression to achieve QS l-diversity and QS t-closeness.

References

[1]
V. Chakaravarthy, H. Gupta, P. Roy, and M. Mohania. Efficient techniques for document sanitization. CIKM, 2008.
[2]
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, 42(4), 2010.
[3]
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In IEEE ICDE, 2006.
[4]
N. Li and T. Li. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, 2007.
[5]
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006.
[6]
P. Shi and L. Xiong. Protecting quasi-sensitive set-valued data. Technical Report TR-2010-004, Emory University, Department of Mathematics and Computer Science, 2010.
[7]
R. C.-W. Wong, A. W.-C. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In VLDB, 2007.
[8]
Y. Xu, K. Wang, A. W.-C. Fu, and P. S. Yu. Anonymizing transaction databases for publication. In SIGKDD, 2008.

Cited By

View all
  • (2024)Efficient Multi-Source Anonymity for Aggregated Internet of Vehicles DatasetsApplied Sciences10.3390/app1408323014:8(3230)Online publication date: 11-Apr-2024
  • (2023)Reinforcement Technique for Classifying Quasi and Non-quasi Attributes for Privacy Preservation and Data ProtectionApplications and Techniques in Information Security10.1007/978-981-99-2264-2_1(3-17)Online publication date: 12-May-2023
  • (2022)Anonymization of Quasi-Sensitive Attribute Sets in Aggregated DatasetSecurity and Communication Networks10.1155/2022/97218172022Online publication date: 1-Jan-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '10: Proceedings of the 19th ACM international conference on Information and knowledge management
October 2010
2036 pages
ISBN:9781450300995
DOI:10.1145/1871437
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. privacy-preserving data publishing
  2. quasi-sensitive attributes
  3. set-valued data

Qualifiers

  • Poster

Conference

CIKM '10

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 30 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Efficient Multi-Source Anonymity for Aggregated Internet of Vehicles DatasetsApplied Sciences10.3390/app1408323014:8(3230)Online publication date: 11-Apr-2024
  • (2023)Reinforcement Technique for Classifying Quasi and Non-quasi Attributes for Privacy Preservation and Data ProtectionApplications and Techniques in Information Security10.1007/978-981-99-2264-2_1(3-17)Online publication date: 12-May-2023
  • (2022)Anonymization of Quasi-Sensitive Attribute Sets in Aggregated DatasetSecurity and Communication Networks10.1155/2022/97218172022Online publication date: 1-Jan-2022
  • (2021)Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive SurveyIEEE Access10.1109/ACCESS.2021.31243099(153276-153304)Online publication date: 2021
  • (2020)Differential Privacy Techniques for Cyber Physical Systems: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2019.294474822:1(746-789)Online publication date: Sep-2021
  • (2019)Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-ClosenessIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2017.269847216:4(580-593)Online publication date: 16-Jul-2019
  • (2019)Protecting Personally Identifiable Information (PII) in Critical Infrastructure Data Using Differential Privacy2019 IEEE International Symposium on Technologies for Homeland Security (HST)10.1109/HST47167.2019.9032942(1-6)Online publication date: Nov-2019
  • (2019)Privacy-Preserving Collaborative Data Anonymization with Sensitive Quasi-Identifiers2019 12th CMI Conference on Cybersecurity and Privacy (CMI)10.1109/CMI48017.2019.8962140(1-6)Online publication date: Nov-2019
  • (2018)Semantic SecurityTransactions on Data Privacy10.5555/2612272.26122736:3(185-198)Online publication date: 13-Dec-2018
  • (2018)A Privacy Risk Assessment Model for Open DataBusiness Modeling and Software Design10.1007/978-3-319-78428-1_10(186-201)Online publication date: 20-Mar-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media