Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2414456.2414474acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy

Published: 02 May 2012 Publication History

Abstract

This paper aims at answering the following two questions in privacy-preserving data analysis and publishing. The first is: What formal privacy guarantee (if any) does k-anonymization methods provide? k-Anonymization methods have been studied extensively in the database community, but have been known to lack strong privacy guarantees. The second question is: How can we benefit from the adversary's uncertainty about the data? More specifically, can we come up a meaningful relaxation of differential privacy [2, 3] by exploiting the adversary's uncertainty about the dataset? We now discuss these two motivations in more detail.

References

[1]
K. Chaudhuri and N. Mishra. When random sampling preserves privacy. In CRYPTO, pages 198--213, 2006.
[2]
C. Dwork. Differential privacy. In ICALP, pages 1--12, 2006.
[3]
C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1--19, 2008.
[4]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265--284, 2006.
[5]
B. Gedik and L. Liu. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, 7: 1--18, January 2008.
[6]
P. Samarati. Protecting respondents' identities in microdata release. IEEE Trans. on Knowl. and Data Eng., 13: 1010--1027, November 2001.
[7]
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International, 1998.
[8]
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5): 571--588, 2002.
[9]
L. Sweeney. k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5): 557--570, 2002.

Cited By

View all
  • (2024)A Differentially Private (Random) Decision Tree without Noise from k-AnonymityApplied Sciences10.3390/app1417762514:17(7625)Online publication date: 28-Aug-2024
  • (2024)Federated Submodular Maximization With Differential PrivacyIEEE Internet of Things Journal10.1109/JIOT.2023.332480111:2(1827-1839)Online publication date: 15-Jan-2024
  • (2024)Privacy-Optimized Randomized Response for Sharing Multi-Attribute Data2024 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC61673.2024.10733730(1-8)Online publication date: 26-Jun-2024
  • Show More Cited By

Index Terms

  1. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
        May 2012
        119 pages
        ISBN:9781450316484
        DOI:10.1145/2414456
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 02 May 2012

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article

        Conference

        ASIA CCS '12
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 418 of 2,322 submissions, 18%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)167
        • Downloads (Last 6 weeks)22
        Reflects downloads up to 23 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)A Differentially Private (Random) Decision Tree without Noise from k-AnonymityApplied Sciences10.3390/app1417762514:17(7625)Online publication date: 28-Aug-2024
        • (2024)Federated Submodular Maximization With Differential PrivacyIEEE Internet of Things Journal10.1109/JIOT.2023.332480111:2(1827-1839)Online publication date: 15-Jan-2024
        • (2024)Privacy-Optimized Randomized Response for Sharing Multi-Attribute Data2024 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC61673.2024.10733730(1-8)Online publication date: 26-Jun-2024
        • (2024)Privacy in manifolds: Combining k-anonymity with differential privacy on Fréchet meansComputers & Security10.1016/j.cose.2024.103983144(103983)Online publication date: Sep-2024
        • (2024)Parallel Fuzzy C-Means Clustering Based Big Data Anonymization Using Hadoop MapReduceWireless Personal Communications10.1007/s11277-024-11101-7135:4(2103-2130)Online publication date: 14-May-2024
        • (2024)Utility Analysis of Differentially Private Anonymized Data Based on Random SamplingPrivacy in Statistical Databases10.1007/978-3-031-69651-0_3(35-47)Online publication date: 25-Sep-2024
        • (2024)Privacy in Federated Learning Natural Language ModelsHandbook of Trustworthy Federated Learning10.1007/978-3-031-58923-2_9(259-287)Online publication date: 10-May-2024
        • (2023)Privacy amplification via compressionProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3669152(69202-69227)Online publication date: 10-Dec-2023
        • (2023)DP-fast MHProceedings of the 40th International Conference on Machine Learning10.5555/3618408.3620166(41847-41860)Online publication date: 23-Jul-2023
        • (2023)Differential privacy, linguistic fairness, and training data influenceProceedings of the 40th International Conference on Machine Learning10.5555/3618408.3619629(29354-29387)Online publication date: 23-Jul-2023
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media