Skip to main content
Erschienen in: Soft Computing 10/2012

01.10.2012 | Original Paper

Reidentification and k-anonymity: a model for disclosure risk in graphs

verfasst von: Klara Stokes, Vicenç Torra

Erschienen in: Soft Computing | Ausgabe 10/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modeling the anonymity of a database table and we prove that n-confusion is a generalization of k-anonymity. After a short survey on the different available definitions of k-anonymity for graphs we provide a new definition for k-anonymous graph, which we consider to be the correct definition. We provide a description of the k-anonymous graphs, both for the regular and the non-regular case. We also introduce the more flexible concept of (kl)-anonymous graph. Our definition of (kl)-anonymous graph is meant to replace a previous definition of (kl)-anonymous graph, which we here prove to have severe weaknesses. Finally, we provide a set of algorithms for k-anonymization of graphs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bloch I (1999) On fuzzy distances and their use in image processing under imprecision. Pattern Recognit 32:1873–1895CrossRef Bloch I (1999) On fuzzy distances and their use in image processing under imprecision. Pattern Recognit 32:1873–1895CrossRef
Zurück zum Zitat Chateauneuf A (1994) Combination of compatible belief functions and relation of specificity. In: Yager RR, Kacprzyk J, Fedrizzi M (eds) Advances in Dempster–Shafer theory of evidence. Wiley, New York, pp 97–114 Chateauneuf A (1994) Combination of compatible belief functions and relation of specificity. In: Yager RR, Kacprzyk J, Fedrizzi M (eds) Advances in Dempster–Shafer theory of evidence. Wiley, New York, pp 97–114
Zurück zum Zitat Dalenius T (1986) Finding a needle in a haystack. J Off Stat 2(3):329–336 Dalenius T (1986) Finding a needle in a haystack. J Off Stat 2(3):329–336
Zurück zum Zitat Domingo-Ferrer J, Torra V (2001) A quantitative comparison of disclosure control methods for microdata. In: Doyle P, Lane JI, Theeuwes JJM, Zayatz L (eds) Confidentiality, disclosure and data access: theory and practical applications for statistical agencies, North-Holland, pp 111–134 Domingo-Ferrer J, Torra V (2001) A quantitative comparison of disclosure control methods for microdata. In: Doyle P, Lane JI, Theeuwes JJM, Zayatz L (eds) Confidentiality, disclosure and data access: theory and practical applications for statistical agencies, North-Holland, pp 111–134
Zurück zum Zitat Domingo-Ferrer J, Torra V (2005) Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Min Knowl Discov 11(2):195–212MathSciNetCrossRef Domingo-Ferrer J, Torra V (2005) Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Min Knowl Discov 11(2):195–212MathSciNetCrossRef
Zurück zum Zitat Domingo-Ferrer J, Rufian-Torrell G (2012) Generalized microaggregation and generation of hybrid nominal and non-nominal data. (manuscript in preparation) Domingo-Ferrer J, Rufian-Torrell G (2012) Generalized microaggregation and generation of hybrid nominal and non-nominal data. (manuscript in preparation)
Zurück zum Zitat Dwork C (2006) Differential privacy. In: Proceedings of ICALP 2006, Lecture Notes in Computer Science, vol. 4052, pp 1–12 Dwork C (2006) Differential privacy. In: Proceedings of ICALP 2006, Lecture Notes in Computer Science, vol. 4052, pp 1–12
Zurück zum Zitat Feder T, Nabar SU, Terzi E (2008) Anonymizing graphs, CoRR abs/0810.5578, October Feder T, Nabar SU, Terzi E (2008) Anonymizing graphs, CoRR abs/0810.5578, October
Zurück zum Zitat Hay M, Miklau G, Jensen D (2008a) Anonymizing social networks. In: Proceedings of VLDB 2008 Hay M, Miklau G, Jensen D (2008a) Anonymizing social networks. In: Proceedings of VLDB 2008
Zurück zum Zitat Hay M, Miklau G, Jensen D, Towsley D, Weis P (2008b) Resisting structural re-identification in anonymized social networks. In: Proceedings VLDB Endow, pp 102–114 Hay M, Miklau G, Jensen D, Towsley D, Weis P (2008b) Resisting structural re-identification in anonymized social networks. In: Proceedings VLDB Endow, pp 102–114
Zurück zum Zitat Klir G, Yuan B (1995) Fuzzy sets and fuzzy logic: theory and applications. Prentice Hall, UKMATH Klir G, Yuan B (1995) Fuzzy sets and fuzzy logic: theory and applications. Prentice Hall, UKMATH
Zurück zum Zitat Liew CK, Choi UJ, Liew CJ (1985) A data distortion by probability distribution. ACM Trans Database Syst 10:395–411 Liew CK, Choi UJ, Liew CJ (1985) A data distortion by probability distribution. ACM Trans Database Syst 10:395–411
Zurück zum Zitat Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: Proceedings of SIGMOD 2008 Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: Proceedings of SIGMOD 2008
Zurück zum Zitat Samarati P (2001) Protecting respondents’ identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010–1027CrossRef Samarati P (2001) Protecting respondents’ identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010–1027CrossRef
Zurück zum Zitat Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. SRI Intl Tech Rep Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. SRI Intl Tech Rep
Zurück zum Zitat Stokes K, Torra V (2011) On some clustering approaches for graphs. In: Proceedings of the IEEE international conference on fuzzy systems (FUZZIEEE), Taipei, Taiwan, 27–30 June 2011, 409415, ISBN 978-1-4244-7315-1 Stokes K, Torra V (2011) On some clustering approaches for graphs. In: Proceedings of the IEEE international conference on fuzzy systems (FUZZIEEE), Taipei, Taiwan, 27–30 June 2011, 409415, ISBN 978-1-4244-7315-1
Zurück zum Zitat Stokes K, Torra V (2012) n-Confusion: a generalization of k-anonymity. In: Proceedings of the 5th international workshop on privacy and anonymity in the information society (PAIS12), Berlin, Germany, 30 March 2012 Stokes K, Torra V (2012) n-Confusion: a generalization of k-anonymity. In: Proceedings of the 5th international workshop on privacy and anonymity in the information society (PAIS12), Berlin, Germany, 30 March 2012
Zurück zum Zitat Sweeney L (2002a) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl Based Syst 10(5):571–588MathSciNetMATHCrossRef Sweeney L (2002a) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl Based Syst 10(5):571–588MathSciNetMATHCrossRef
Zurück zum Zitat Winkler WE (2004) Re-identification methods for masked microdata, PSD 2004, Lecture Notes in Computer Science, vol 3050, pp 216–230 Winkler WE (2004) Re-identification methods for masked microdata, PSD 2004, Lecture Notes in Computer Science, vol 3050, pp 216–230
Zurück zum Zitat Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks, Proc. ICDE 2008 Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks, Proc. ICDE 2008
Metadaten
Titel
Reidentification and k-anonymity: a model for disclosure risk in graphs
verfasst von
Klara Stokes
Vicenç Torra
Publikationsdatum
01.10.2012
Verlag
Springer-Verlag
Erschienen in
Soft Computing / Ausgabe 10/2012
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-012-0850-4

Weitere Artikel der Ausgabe 10/2012

Soft Computing 10/2012 Zur Ausgabe