skip to main content
10.1145/1456403.1456423acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Yet another privacy metric for publishing micro-data

Published:27 October 2008Publication History

ABSTRACT

Recently many schemes, including k-anonymity [8], l-diversity [6] and t-closeness [5] have been introduced for preserving individual privacy when publishing database tables. Furthermore k-anonymity and l-diversity have been shown to have weaknesses. In this paper, we show that t-closeness also has limitations, more specifically we argue that: i) choosing the correct value for t is difficult, ii) t-closeness does not allow some values of sensitive attributes to be more sensitive than other values, and iii) to prevent certain types of privacy leaks t must be set to such a small value that it produces low-quality published data. In this paper we propose a new privacy metric,(αi, βi)-closeness, that mitigates these problems. We also show how to calculate an optimal release table (in the full domain model) that satisfies (αi, βi)-closeness and we present experimental results that show that the data quality provided by 9αi, β;i),-closeness is higher than t-closeness, k-anonymity, and l-diversity while achieving the same privacy goals.

References

  1. R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE'05: Proceedings of the 21st International Conference on Data Engineering, pages 217--228, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Chen, R. Ramakrishnan, and K. LeFevre. Privacy skyline: Privacy with multidimensional adversarial knowledge. In VLDB'07: Proceedings of the 33rd international conference on Very large data bases, pages 770--781. VLDB Endowment, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. K. LeFevre, D.J. DeWitt, and R. Ramakrishnan. Incognito: efficient full-domain k-anonymity. In SIGMOD'05: Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pages 49---60, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. LeFevre, D.J. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE'06: Proceedings of the 22nd International Conference on Data Engineering, page 25, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Li, T. Li, and s. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE'07: Proceedings of the 23rd International Conference on Data Engineering, pages 106--115, Washington, DC, USA, 2007. IEEE Computer Society.Google ScholarGoogle Scholar
  6. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1(1):3, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Halpern. Worst-case background knowledge. In ICDE'07: Proceedings of the 21st International Conference on Data Engineering, pages 126--135. IEEE Computer Society, 2007.Google ScholarGoogle Scholar
  8. L. Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):557--570, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. C. Wong, J. Li, A. W. Fu, and K. Wang. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In KDD '06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 754--759, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. X. Xiao and Y. Tao. Anatomy: simple and effective privacy preservation. In VLDB'06: Proceedings of the 32nd international conference on Very large data bases, pages 139--150. VLDB Endowment, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. X. Xiao and Y. Tao. Personalized privacy preservation. In SIGMOD'06: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pages 229--240, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. X. Xiao and Y. Tao. M-invariance: towards privacy preserving re-publication of dynamic datasets. In SIGMOD'07: Proceedings of the 2007 ACM SIGMOD international conference on Management of data, pages 689--700, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Yet another privacy metric for publishing micro-data

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society
      October 2008
      128 pages
      ISBN:9781605582894
      DOI:10.1145/1456403

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 October 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate106of355submissions,30%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader