Skip to main content
Erschienen in:
Buchtitelbild

2017 | OriginalPaper | Buchkapitel

CLiKC: A Privacy-Mindful Approach When Sharing Data

verfasst von : Esma Aïmeur, Gilles Brassard, Jonathan Rioux

Erschienen in: Risks and Security of Internet and Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We introduce CLiKC, a context-aware anonymization algorithm that takes advantage of external information available about the situation under consideration. This enables a more precise understanding of the resulting utility, thus reducing the risks of unfortunate disclosure. CLiKC was successfully applied to a Canadian life-insurance publicly available data set.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
A quasi-identifier is an attribute that does not lead to successful identification by itself, but may do so in combination with other attributes.
 
2
Note the similarity with k-anonymity.
 
4
It usually isn’t, but this illustrates our point quite well.
 
5
Available at the aforementioned URL.
 
Literatur
1.
Zurück zum Zitat Acquisti, A., John, L., Loewenstein, G.: What is privacy worth? J. Legal Stud. 42(2) (2013). Article 1 Acquisti, A., John, L., Loewenstein, G.: What is privacy worth? J. Legal Stud. 42(2) (2013). Article 1
2.
Zurück zum Zitat Aggarwal, C.C.: On \(k\)-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 901–909. VLDB Endowment (2005) Aggarwal, C.C.: On \(k\)-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 901–909. VLDB Endowment (2005)
3.
Zurück zum Zitat Dagher, G.G., Iqbal, F., Arafati, M., Fung, B.C.M.: Fusion: privacy-preserving distributed protocol for high-dimensional data mashup. In: 21st International Conference on Parallel and Distributed Systems (ICPADS), pp. 760–769. IEEE (2015) Dagher, G.G., Iqbal, F., Arafati, M., Fung, B.C.M.: Fusion: privacy-preserving distributed protocol for high-dimensional data mashup. In: 21st International Conference on Parallel and Distributed Systems (ICPADS), pp. 760–769. IEEE (2015)
4.
Zurück zum Zitat Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). doi:10.1007/11681878_14 CrossRef Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). doi:10.​1007/​11681878_​14 CrossRef
5.
Zurück zum Zitat Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1–53 (2010)CrossRef Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1–53 (2010)CrossRef
6.
Zurück zum Zitat Li, N., Li, T., Venkatasubramanian, S.: \(t\)-closeness: privacy beyond \(k\)-anonymity and \(l\)-diversity. In: 23rd International Conference on Data Engineering (ICDE 2007), pp. 106–115. IEEE (2007) Li, N., Li, T., Venkatasubramanian, S.: \(t\)-closeness: privacy beyond \(k\)-anonymity and \(l\)-diversity. In: 23rd International Conference on Data Engineering (ICDE 2007), pp. 106–115. IEEE (2007)
7.
Zurück zum Zitat Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \(l\)-diversity: privacy beyond \(k\)-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3 (2007)CrossRef Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \(l\)-diversity: privacy beyond \(k\)-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3 (2007)CrossRef
8.
Zurück zum Zitat Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.Y.: Worst-case background knowledge for privacy-preserving data publishing. In: 23rd International Conference on Data Engineering (ICDE 2007), pp. 126–135. IEEE (2007) Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.Y.: Worst-case background knowledge for privacy-preserving data publishing. In: 23rd International Conference on Data Engineering (ICDE 2007), pp. 126–135. IEEE (2007)
9.
Zurück zum Zitat Meyerson, A., Williams, R.: On the complexity of optimal \(k\)-anonymity. In: Proceedings of the 23rd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 2004), pp. 223–228. ACM (2004) Meyerson, A., Williams, R.: On the complexity of optimal \(k\)-anonymity. In: Proceedings of the 23rd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 2004), pp. 223–228. ACM (2004)
10.
Zurück zum Zitat Mohammed, N., Fung, B.C.M., Hung, P.C.K., Lee, C.-k.: Anonymizing healthcare data: a case study on the blood transfusion service. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1285–1294. ACM (2009) Mohammed, N., Fung, B.C.M., Hung, P.C.K., Lee, C.-k.: Anonymizing healthcare data: a case study on the blood transfusion service. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1285–1294. ACM (2009)
11.
Zurück zum Zitat Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Symposium on Security and Privacy (SP 2008), pp. 111–125. IEEE (2008) Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Symposium on Security and Privacy (SP 2008), pp. 111–125. IEEE (2008)
14.
Zurück zum Zitat Shmueli, E., Tassa, T., Wasserstein, R., Shapira, B., Rokach, L.: Limiting disclosure of sensitive data in sequential releases of databases. Inf. Sci. 191, 98–127 (2012)CrossRef Shmueli, E., Tassa, T., Wasserstein, R., Shapira, B., Rokach, L.: Limiting disclosure of sensitive data in sequential releases of databases. Inf. Sci. 191, 98–127 (2012)CrossRef
15.
Zurück zum Zitat Skowron, A., Rauszer, C.: The discernibility matrices and functions in information systems. In: Słowiński, R. (ed.) Intelligent Decision Support: Handbook of Applications and Advances of the Rough Sets Theory, pp. 331–362. Springer, Heidelberg (1992) Skowron, A., Rauszer, C.: The discernibility matrices and functions in information systems. In: Słowiński, R. (ed.) Intelligent Decision Support: Handbook of Applications and Advances of the Rough Sets Theory, pp. 331–362. Springer, Heidelberg (1992)
16.
Zurück zum Zitat Wang, K., Fung, B.C.M.: Anonymizing sequential releases. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006, pp. 414–423. ACM (2006) Wang, K., Fung, B.C.M.: Anonymizing sequential releases. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006, pp. 414–423. ACM (2006)
17.
Zurück zum Zitat Wang, K., Fung, B.C.M., Yu, P.S.: Handicapping attacker’s confidence: an alternative to \(k\)-anonymization. Knowl. Inf. Syst. 11(3), 345–368 (2006)CrossRef Wang, K., Fung, B.C.M., Yu, P.S.: Handicapping attacker’s confidence: an alternative to \(k\)-anonymization. Knowl. Inf. Syst. 11(3), 345–368 (2006)CrossRef
18.
Zurück zum Zitat Wong, R.C.-W., Li, J., Fu, A.W.-C., Wang, K.: (\(\alpha \), \(k\))-anonymity: an enhanced \(k\)-anonymity model for privacy preserving data publishing. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 754–759. ACM (2006) Wong, R.C.-W., Li, J., Fu, A.W.-C., Wang, K.: (\(\alpha \), \(k\))-anonymity: an enhanced \(k\)-anonymity model for privacy preserving data publishing. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 754–759. ACM (2006)
Metadaten
Titel
CLiKC: A Privacy-Mindful Approach When Sharing Data
verfasst von
Esma Aïmeur
Gilles Brassard
Jonathan Rioux
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-54876-0_1