Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication 2018
DOI: 10.1145/3164541.3164583
|View full text |Cite
|
Sign up to set email alerts
|

Set-valued Data Anonymization Maintaining Data Utility and Data Property

Abstract: Set-valued database publication has been attracting much attention due to its benefit for various applications like recommendation systems and marketing analysis. However, publishing original database directly is risky since an unauthorized party may violate individual privacy by associating and analyzing relations between individuals and set of items in the published database, which is known as identity linkage attack. Generally, an attack is performed based on attacker's background knowledge obtained by a pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…When anonymizing a data set, we do not have to focus only on ensuring privacy in big data but also on preserving data utility before publishing the anonymized data set. ere are various metrics to quantify the usefulness of the data [15,16]. In this paper, we will focus on the NCP in order to evaluate the results of our proposed algorithm.…”
Section: Evaluation Of the Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…When anonymizing a data set, we do not have to focus only on ensuring privacy in big data but also on preserving data utility before publishing the anonymized data set. ere are various metrics to quantify the usefulness of the data [15,16]. In this paper, we will focus on the NCP in order to evaluate the results of our proposed algorithm.…”
Section: Evaluation Of the Algorithmmentioning
confidence: 99%
“…In the literature, several studies have used the NCP to measure the information loss [14][15][16][17][18]. e utility is mostly…”
Section: Evaluation Of the Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this action may distort item correlation in the transactions that result in significant changes in a sanitized database content [28]. To address this problem, in this research, the strategy in [5] is adopted. The key point of the strategy is checking whether items i ∈ t x that will be swapped are coexisting with that in t ′…”
Section: B Measuring Transactions Similarity and Pairing The Transactionsmentioning
confidence: 99%
“…The proposed method follows the swappingbased strategy to ensure privacy protection in a database while at the same time preventing excessive side effects of the data sanitization process. The method follows a recent data swapping method that has been developed in [5] to generate an anonymized database. The proposed method uses an item collision detection strategy, and it carefully selects a pair of transaction records for swapping by evaluating item similarity in the transaction records.…”
Section: Introductionmentioning
confidence: 99%