Skip to main content
Erschienen in: Journal of Intelligent Information Systems 3/2019

24.06.2019

Safe disassociation of set-valued datasets

verfasst von: Nancy Awad, Bechara Al Bouna, Jean-Francois Couchot, Laurent Philippe

Erschienen in: Journal of Intelligent Information Systems | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Disassociation is a bucketization based anonymization technique that divides a set-valued dataset into several clusters to hide the link between individuals and their complete set of items. It increases the utility of the anonymized dataset, but on the other side, it raises many privacy concerns, one in particular, is when the items are tightly coupled to form what is called, a cover problem. In this paper, we present safe disassociation, a technique that relies on partial suppression, to overcome the aforementioned privacy breach encountered when disassociating set-valued datasets. Safe disassociation allows the km-anonymity privacy constraint to be extended to a bucketized dataset and copes with the cover problem. We describe our algorithm that achieves the safe disassociation and we provide a set of experiments to demonstrate its efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
In what follows, we use km-disassociation to denote a dataset that is disassociated and satisfies km-anonymity.
 
2
Vertical partitioning creates km-anonymous record chunks.
 
Literatur
Zurück zum Zitat Barakat, S., al Bouna, B., Nassar, M., Guyeux, C. (2016). On the evaluation of the privacy breach in disassociated set-valued datasets. In Callegari, C., van Sinderen, M., Sarigiannidis, P.G., Samarati, P., Cabello, E., Lorenz, P., Obaidat, M.S. (Eds.) Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016 (pp. 318–326). SciTePress. Barakat, S., al Bouna, B., Nassar, M., Guyeux, C. (2016). On the evaluation of the privacy breach in disassociated set-valued datasets. In Callegari, C., van Sinderen, M., Sarigiannidis, P.G., Samarati, P., Cabello, E., Lorenz, P., Obaidat, M.S. (Eds.) Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016 (pp. 318–326). SciTePress.
Zurück zum Zitat Bewong, M., Liu, J., Liu, L., Li, J. (2017). Utility aware clustering for publishing transactional data. In Kim, J., Shim, K., Cao, L., Lee, J.-G., Lin, X., Moon, Y.-S. (Eds.) Advances in Knowledge Discovery and Data Mining (pp. 481–494). Cham: Springer International Publishing.CrossRef Bewong, M., Liu, J., Liu, L., Li, J. (2017). Utility aware clustering for publishing transactional data. In Kim, J., Shim, K., Cao, L., Lee, J.-G., Lin, X., Moon, Y.-S. (Eds.) Advances in Knowledge Discovery and Data Mining (pp. 481–494). Cham: Springer International Publishing.CrossRef
Zurück zum Zitat Biskup, J., Marcel, P.B., Wiese, L. (2011). On the inference-proofness of database fragmentation satisfying confidentiality constraints. In: Proceedings of the 14th Information Security Conference, Xian, China. Biskup, J., Marcel, P.B., Wiese, L. (2011). On the inference-proofness of database fragmentation satisfying confidentiality constraints. In: Proceedings of the 14th Information Security Conference, Xian, China.
Zurück zum Zitat Barbaro, M., & Zeller, T. (2006). A face is exposed for aol searcher no. 4417749. Barbaro, M., & Zeller, T. (2006). A face is exposed for aol searcher no. 4417749.
Zurück zum Zitat Chen, L., Zhong, S., Wang, L.-E., Li, X. (2016). A sensitivity-adaptive ρ-uncertainty model for set-valued data. In International Conference on Financial Cryptography and Data Security 2016 (pp. 460–473). Berlin: Springer. Chen, L., Zhong, S., Wang, L.-E., Li, X. (2016). A sensitivity-adaptive ρ-uncertainty model for set-valued data. In International Conference on Financial Cryptography and Data Security 2016 (pp. 460–473). Berlin: Springer.
Zurück zum Zitat Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P. (2010). Combining fragmentation and encryption to protect privacy in data storage. ACM Transactions on Information and System Security, 13, 22:1–22:33.CrossRef Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P. (2010). Combining fragmentation and encryption to protect privacy in data storage. ACM Transactions on Information and System Security, 13, 22:1–22:33.CrossRef
Zurück zum Zitat De Capitani di Vimercati, S, Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P. (2013). Extending loose associations to multiple fragments. In Proceedings of the 27th International Conference on Data and Applications Security and Privacy XXVII, DBSec’13 (pp. 1–16). Berlin: Springer. De Capitani di Vimercati, S, Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P. (2013). Extending loose associations to multiple fragments. In Proceedings of the 27th International Conference on Data and Applications Security and Privacy XXVII, DBSec’13 (pp. 1–16). Berlin: Springer.
Zurück zum Zitat Dwork, C., McSherry, F., Nissim, K., Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. In Proceedings of the Third Conference on Theory of Cryptography, TCC’06 (pp. 265–284). Berlin: Springer.CrossRef Dwork, C., McSherry, F., Nissim, K., Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. In Proceedings of the Third Conference on Theory of Cryptography, TCC’06 (pp. 265–284). Berlin: Springer.CrossRef
Zurück zum Zitat Fard, A.M., & Wang, K. (2010). An effective clustering approach to web query log anonymization. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT) (pp. 1–11). IEEE. Fard, A.M., & Wang, K. (2010). An effective clustering approach to web query log anonymization. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT) (pp. 1–11). IEEE.
Zurück zum Zitat He, Y., & Naughton, J.F. (2009). Anonymization of set-valued data via top-down, local generalization. Proceedings of the VLDB Endowment, 2(1), 934–945.CrossRef He, Y., & Naughton, J.F. (2009). Anonymization of set-valued data via top-down, local generalization. Proceedings of the VLDB Endowment, 2(1), 934–945.CrossRef
Zurück zum Zitat Jia, X., Pan, C., Xu, X., Zhu, K.Q., Lo, E. (2014). ρ-uncertainty anonymization by partial suppression. In Bhowmick, S.S., Dyreson, C.E., Jensen, C.S., Lee, M.L., Muliantara, A., Thalheim, B. (Eds.) Database Systems for Advanced Applications, volume 8422 of Lecture Notes in Computer Science (pp. 188–202). Berlin: Springer International Publishing. Jia, X., Pan, C., Xu, X., Zhu, K.Q., Lo, E. (2014). ρ-uncertainty anonymization by partial suppression. In Bhowmick, S.S., Dyreson, C.E., Jensen, C.S., Lee, M.L., Muliantara, A., Thalheim, B. (Eds.) Database Systems for Advanced Applications, volume 8422 of Lecture Notes in Computer Science (pp. 188–202). Berlin: Springer International Publishing.
Zurück zum Zitat Loukides, G., Liagouris, J., Gkoulalas-Divanis, A., Terrovitis, M. (2015). Utility-constrained electronic health record data publishing through generalization and disassociation. In Gkoulalas-Divanis, A., & Loukides, G. (Eds.) Medical Data Privacy Handbook (pp. 149–177). Berlin: Springer International Publishing. Loukides, G., Liagouris, J., Gkoulalas-Divanis, A., Terrovitis, M. (2015). Utility-constrained electronic health record data publishing through generalization and disassociation. In Gkoulalas-Divanis, A., & Loukides, G. (Eds.) Medical Data Privacy Handbook (pp. 149–177). Berlin: Springer International Publishing.
Zurück zum Zitat Loukides, G., Liagouris, J., Gkoulalas-divanis, A., Terrovitis, M. (2014). Disassociation for electronic health record privacy. Journal of Biomedical Informatics, 50, 46–61.CrossRef Loukides, G., Liagouris, J., Gkoulalas-divanis, A., Terrovitis, M. (2014). Disassociation for electronic health record privacy. Journal of Biomedical Informatics, 50, 46–61.CrossRef
Zurück zum Zitat Li, T., Li, N., Zhang, J., Molloy, I. (2012). Slicing: a new approach for privacy preserving data publishing. IEEE Transactions on Knowledge and Data Engineering, 24(3), 561–574.CrossRef Li, T., Li, N., Zhang, J., Molloy, I. (2012). Slicing: a new approach for privacy preserving data publishing. IEEE Transactions on Knowledge and Data Engineering, 24(3), 561–574.CrossRef
Zurück zum Zitat Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M. (2006). l-diversity: Privacy beyond k-anonymity. In: Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta Georgia. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M. (2006). l-diversity: Privacy beyond k-anonymity. In: Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta Georgia.
Zurück zum Zitat Samarati, P. (2001). Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6), 1010–1027.CrossRef Samarati, P. (2001). Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6), 1010–1027.CrossRef
Zurück zum Zitat Sweeney, L. (2002). k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5), 557–570.MathSciNetCrossRef Sweeney, L. (2002). k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5), 557–570.MathSciNetCrossRef
Zurück zum Zitat Terrovitis, M., Mamoulis, N., Kalnis, P. (2008). Privacy-preserving anonymization of set-valued data. PVLDB, 1(1), 115–125. Terrovitis, M., Mamoulis, N., Kalnis, P. (2008). Privacy-preserving anonymization of set-valued data. PVLDB, 1(1), 115–125.
Zurück zum Zitat Terrovitis, M., Mamoulis, N., Liagouris, J., Skiadopoulos, S. (2012). Privacy preservation by disassociation. Proceedings of the VLDB Endowment, 5(10), 944–955.CrossRef Terrovitis, M., Mamoulis, N., Liagouris, J., Skiadopoulos, S. (2012). Privacy preservation by disassociation. Proceedings of the VLDB Endowment, 5(10), 944–955.CrossRef
Zurück zum Zitat Wang, J., Deng, C., Li, X. (2018). Two privacy-preserving approaches for publishing transactional data streams. IEEE Access, pp. 1–1. Wang, J., Deng, C., Li, X. (2018). Two privacy-preserving approaches for publishing transactional data streams. IEEE Access, pp. 1–1.
Zurück zum Zitat Ke, W., Wang, P., Fu, A.W., Wong, R.C.-W. (2016). Generalized bucketization scheme for flexible privacy settings. Information Sciences, 348, 377–393.MathSciNetCrossRef Ke, W., Wang, P., Fu, A.W., Wong, R.C.-W. (2016). Generalized bucketization scheme for flexible privacy settings. Information Sciences, 348, 377–393.MathSciNetCrossRef
Zurück zum Zitat Xiao, X., & Tao, Y. (2006). Anatomy: Simple and effective privacy preservation. In: Proceedings of 32nd International Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea, September 12-15. Xiao, X., & Tao, Y. (2006). Anatomy: Simple and effective privacy preservation. In: Proceedings of 32nd International Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea, September 12-15.
Zurück zum Zitat Zhang, H., Zhou, Z., Ye, L., Xiaojiang, D.U. (2015). Towards privacy preserving publishing of set-valued data on hybrid cloud. In: IEEE Transactions on cloud computing. Zhang, H., Zhou, Z., Ye, L., Xiaojiang, D.U. (2015). Towards privacy preserving publishing of set-valued data on hybrid cloud. In: IEEE Transactions on cloud computing.
Metadaten
Titel
Safe disassociation of set-valued datasets
verfasst von
Nancy Awad
Bechara Al Bouna
Jean-Francois Couchot
Laurent Philippe
Publikationsdatum
24.06.2019
Verlag
Springer US
Erschienen in
Journal of Intelligent Information Systems / Ausgabe 3/2019
Print ISSN: 0925-9902
Elektronische ISSN: 1573-7675
DOI
https://doi.org/10.1007/s10844-019-00568-7

Weitere Artikel der Ausgabe 3/2019

Journal of Intelligent Information Systems 3/2019 Zur Ausgabe