2004
DOI: 10.1007/978-3-540-25955-8_12
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Noise Addition for Privacy in Statistical Databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
41
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(41 citation statements)
references
References 7 publications
0
41
0
Order By: Relevance
“…Multiway transportation problems form a very important class of discrete optimization problems and have been used and studied extensively in the operations research and mathematical programming literature, as well as in the statistics literature in the context of secure statistical data disclosure and management by public agencies, see e.g. [4,6,11,18,19,42,43,53,60,62] and the references therein. The feasible points in a transportation problem are the multiway tables ("contingency tables" in statistics) such that the sums of entries over some of their lower dimensional sub-tables such as lines or planes ("margins" in statistics) are specified.…”
Section: Corollary 415mentioning
confidence: 99%
“…Multiway transportation problems form a very important class of discrete optimization problems and have been used and studied extensively in the operations research and mathematical programming literature, as well as in the statistics literature in the context of secure statistical data disclosure and management by public agencies, see e.g. [4,6,11,18,19,42,43,53,60,62] and the references therein. The feasible points in a transportation problem are the multiway tables ("contingency tables" in statistics) such that the sums of entries over some of their lower dimensional sub-tables such as lines or planes ("margins" in statistics) are specified.…”
Section: Corollary 415mentioning
confidence: 99%
“…A potential difficulty with this approach is that some reidentification experts suggest that knowing information about how the noise was applied to the variables can allow an intruder to reverse "engineer" the data file and potentially identify individuals. Details on how noise can be reverse engineered are available in Domingo-Ferrer, Sebe, and Castella-Roca (2004).…”
Section: Synthetic Treatments Of Microdatamentioning
confidence: 99%
“…In addition, every 2 years the UNESCO sponsors an international conference (i.e., Privacy in Statistical Databases) that gathers worldwide experts from different disciplines to discuss current issues in the field. Proceedings are published by Springer in the series Lecture Notes in Computer Science (Domingo-Ferrer, 2002;Domingo-Ferrer & Franconi, 2006;Domingo-Ferrer & Magkos, 2010;Domingo-Ferrer & Saygin, 2008;DomingoFerrer & Torra, 2004;European Communities, 1998).…”
Section: Need For Protection Need For Informationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, when the covariance matrix of noise is proportional to the covariance matrix of the original data, the additive noise method can preserve the correlation coefficients (Domingo-Ferrer et al, 2004) and preserve regression coefficients. Due to the restriction on the covariance matrix of noise, the additive noise method will lead to asymptotically biased regression estimates for subpopulations; see Tendick and Norman (1987); Domingo-Ferrer et al (2004). Ting et al (2008) introduced the Random Orthogonal Matrix Masking (ROMM) procedure for perturbing data in regression analysis.…”
mentioning
confidence: 99%