2009 IEEE International Conference on Data Mining Workshops 2009
DOI: 10.1109/icdmw.2009.28
|View full text |Cite
|
Sign up to set email alerts
|

An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners

Abstract: Abstract-Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the privacy of the published sanitized data that simply fuses outputs of multiple data miners that are applied to the sanitized data. That attack is practical and does not require any background or additional information. We use a number of experiments to show scenarios where an adversary can combine outputs of multiple miners using a simple f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 30 publications
0
14
0
Order By: Relevance
“…We implemented all data reconstruction methods on the 4500 datasets mentioned above. In each case, we obtained an estimation of the original data set which was then compared with the original data set in terms of the success measures described in the papers [8], [9] and [10]. In each case, although we tested (the same) 4500 matrices in each attack, we present the details of only one of our matrices -one which has 6400 entries.…”
Section: Description and Results Of The Reconstruction Attacksmentioning
confidence: 99%
See 4 more Smart Citations
“…We implemented all data reconstruction methods on the 4500 datasets mentioned above. In each case, we obtained an estimation of the original data set which was then compared with the original data set in terms of the success measures described in the papers [8], [9] and [10]. In each case, although we tested (the same) 4500 matrices in each attack, we present the details of only one of our matrices -one which has 6400 entries.…”
Section: Description and Results Of The Reconstruction Attacksmentioning
confidence: 99%
“…We use the same assumptions on data mentioned in [8] (SPF), [9] (BE-DR) and [10] (MDMF) as appropriate, and use the notation of Table 1. We generate 4500 matrices using the algorithm described in Section 2; 1500 of these were of size 400, 1500 of size 1600 and 1500 of size 6400.…”
Section: Description and Results Of The Reconstruction Attacksmentioning
confidence: 99%
See 3 more Smart Citations