2012
DOI: 10.1007/s11390-012-1203-6
|View full text |Cite
|
Sign up to set email alerts
|

Publishing Set-Valued Data Against Realistic Adversaries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Suppose g 1 , g 2 , .., g m are categories of items in t k and their item frequency in t k are f 1 , f 2 , ..., f m , respectively. From the Equations (4) and (5), the condition that t k in a database does not satisfy the inequality WR t k ,g j > MTV t k becomes for all j ∈ {1, ..., m}. Under this condition the Algorithms 1 and 2 cannot output respective I t k and a pair of P for the t k .…”
Section: Applicability Of the Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Suppose g 1 , g 2 , .., g m are categories of items in t k and their item frequency in t k are f 1 , f 2 , ..., f m , respectively. From the Equations (4) and (5), the condition that t k in a database does not satisfy the inequality WR t k ,g j > MTV t k becomes for all j ∈ {1, ..., m}. Under this condition the Algorithms 1 and 2 cannot output respective I t k and a pair of P for the t k .…”
Section: Applicability Of the Proposed Methodsmentioning
confidence: 99%
“…For example, Bob likes to access autocars.net which is categorized as an automobile website, but replacing the website name with its category i.e., automobile, it does not hide that Bob has a tendency toward automobiles. In addition, employing generalization technique such as full domain generalization in set-valued database leads significant reduction in data utility [4] and causes item loss in databases if several items from the same category appear together in one record [5]. As a result, data recipients cannot obtain maximum utility from the database.Suppression based data anonymization techniques [4,6,7] can be more realistic for hiding personal tendency since certain items in a record are removed so that there is no clue to find the suppressed items.…”
mentioning
confidence: 99%
“…It is further assumed in [30] that adversary has unbounded background knowledge and knows both sensitive and non-sensitive items in database. There is a critique [14] that this further assumption is unrealistic since set-valued data has arbitrary items in its records. k m -anonymity [22] assumed that adversary has knowledge about up to m items from a specific record in the database.…”
Section: Adversary Knowledgementioning
confidence: 99%
“…Records or tuples in set-valued database may contain different number of items and if we consider each item as a quasiidentifier like in relational database, then it will have very high dimensionality [14]. As a result, applying k-anonymity will not be effective due to the curse of high dimensionality in set-valued database [1].…”
Section: Introductionmentioning
confidence: 99%