Injecting utility into anonymized datasets
Proceedings of the 2006 ACM SIGMOD international conference on Management of …, 2006•dl.acm.org
Limiting disclosure in data publishing requires a careful balance between privacy and utility.
Information about individuals must not be revealed, but a dataset should still be useful for
studying the characteristics of a population. Privacy requirements such as k-anonymity and l-
diversity are designed to thwart attacks that attempt to identify individuals in the data and to
discover their sensitive information. On the other hand, the utility of such data has not been
well-studied. In this paper we will discuss the shortcomings of current heuristic approaches …
Information about individuals must not be revealed, but a dataset should still be useful for
studying the characteristics of a population. Privacy requirements such as k-anonymity and l-
diversity are designed to thwart attacks that attempt to identify individuals in the data and to
discover their sensitive information. On the other hand, the utility of such data has not been
well-studied. In this paper we will discuss the shortcomings of current heuristic approaches …
Limiting disclosure in data publishing requires a careful balance between privacy and utility. Information about individuals must not be revealed, but a dataset should still be useful for studying the characteristics of a population. Privacy requirements such as k-anonymity and l-diversity are designed to thwart attacks that attempt to identify individuals in the data and to discover their sensitive information. On the other hand, the utility of such data has not been well-studied.In this paper we will discuss the shortcomings of current heuristic approaches to measuring utility and we will introduce a formal approach to measuring utility. Armed with this utility metric, we will show how to inject additional information into k-anonymous and l-diverse tables. This information has an intuitive semantic meaning, it increases the utility beyond what is possible in the original k-anonymity and l-diversity frameworks, and it maintains the privacy guarantees of k-anonymity and l-diversity.
ACM Digital Library