Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data 2007
DOI: 10.1145/1247480.1247490
|View full text |Cite
|
Sign up to set email alerts
|

Approximate algorithms for K-anonymity

Abstract: When a table containing individual data is published, disclosure of sensitive information should be prohibitive. A naive approach for the problem is to remove identifiers such as name and social security number. However, linking attacks which joins the published table with other tables on some attributes, called quasi-identifier, may reveal the sensitive information. To protect privacy against linking attack, the notion of k-anonymity which makes each record in the table be indistinguishable with k-1 other rec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
94
0
2

Year Published

2008
2008
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 109 publications
(100 citation statements)
references
References 16 publications
(34 reference statements)
1
94
0
2
Order By: Relevance
“…The actual objective is to maximize utility by minimizing the amount of generalization and suppression [94]. Achieving k-anonymity by generalization with this objective as a constraint is a Non-deterministic Polynomial-time hard (NP-hard) problem [95].…”
Section: K-anonymitymentioning
confidence: 99%
“…The actual objective is to maximize utility by minimizing the amount of generalization and suppression [94]. Achieving k-anonymity by generalization with this objective as a constraint is a Non-deterministic Polynomial-time hard (NP-hard) problem [95].…”
Section: K-anonymitymentioning
confidence: 99%
“…For the latter, they proposed an approximate algorithm that minimizes the number of suppressed values; the approximation bound is O(k · logk). [2] improved this bound to O(k), while [17] further reduced it to O(log k). Several approaches limit the search space by considering only global recoding.…”
Section: Related Workmentioning
confidence: 99%
“…However several heuristics have been proposed to provide fast k-anonymization algorithms (Park & Shim, 2007). We do not aim in this paper at presenting a new heuristic for detecting composed identity attributes so we rely on existing ones.…”
Section: Figure 3: Matrix For Acquisition By Votingmentioning
confidence: 99%