2008 IEEE 24th International Conference on Data Engineering 2008
DOI: 10.1109/icde.2008.4497481
|View full text |Cite
|
Sign up to set email alerts
|

On Anti-Corruption Privacy Preserving Publication

Abstract: This paper deals with a new type of privacy threat, called "corruption", in anonymized data publication. Specifically, an adversary is said to have corrupted some individuals, if s/he has already obtained their sensitive values before consulting the released information. Conventional generalization may lead to severe privacy disclosure in the presence of corruption. Motivated by this, we advocate an alternative anonymization technique that integrates generalization with perturbation and stratified sampling. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
59
0
1

Year Published

2008
2008
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 47 publications
(61 citation statements)
references
References 22 publications
0
59
0
1
Order By: Relevance
“…For future work, we also plan to consider the threat of corruption [49] in the -anonymity strategy. For example (Figure 7), Alex, Brent, and Carl are 3-anonymity.…”
Section: Resultsmentioning
confidence: 99%
“…For future work, we also plan to consider the threat of corruption [49] in the -anonymity strategy. For example (Figure 7), Alex, Brent, and Carl are 3-anonymity.…”
Section: Resultsmentioning
confidence: 99%
“…Generalization replaces the exact QID value by a less concrete form. For example, value 15 is generalized to range [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30]. Suppression removes some values or the entire tuple from T .…”
Section: Related Workmentioning
confidence: 99%
“…Privacy guarantees. Uniform perturbation can ensure several different types of privacy guarantees, such as ρ1-ρ2 privacy [11] and δ-growth [29]. Specifically, both ρ1-ρ2 privacy and δ-growth impose constraints on adversaries' prior and posterior beliefs about any sensitive value X in the input data.…”
Section: Preliminariesmentioning
confidence: 99%
“…Each recipient's data can be used in the same way as if it was computed via ordinary uniform perturbation. This is important because effective algorithms have been developed to use the output of uniform perturbation to perform analytical tasks such as frequent itemset mining [4,11,12], classification by decision trees [8,29], counting [3], etc. Every recipient, therefore, is able to apply those algorithms directly.…”
Section: Contributionsmentioning
confidence: 99%