Advertisement

Personalized Privacy Preservation

  • Yufei Tao
  • Xiaokui Xiao
Part of the Advances in Database Systems book series (ADBS, volume 34)

Unlike conventional methods that exert the same amount of privacy control over all the tuples in the microdata, personalized privacy preservation applies various degrees of protection to different tuples, subject to the preferences of the data owners. This chapter explains the formulation of personal preferences, and the computation of anonymized tables that fulfill the privacy requirement of everybody. Several theoretical results regarding privacy guarantees will also be discussed. Finally, we point out the open research issues that may be explored in the future.

Keywords

Personalized k-anonymity l-diversity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    C. C. Aggarwal and P. S. Yu. A condensation approach to privacy preserving data mining. In EDBT, pages 183–199, 2004.Google Scholar
  2. 2.
    C. C. Aggarwal and P. S. Yu. On variable constraints in privacy preserving data mining. In SDM, 2005.Google Scholar
  3. 3.
    R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217–228, 2005.Google Scholar
  4. 4.
    B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In ICDE, pages 205–216, 2005.Google Scholar
  5. 5.
    B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In ICDCS, pages 620–629, 2005.Google Scholar
  6. 6.
    M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys, 2003.Google Scholar
  7. 7.
    V. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, pages 279–288, 2002.Google Scholar
  8. 8.
    K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In SIGMOD, pages 49–60, 2005.Google Scholar
  9. 9.
    A. Machanavajjhala, J. Gehrke, and D. Kifer. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006.Google Scholar
  10. 10.
    M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: Query processing for location services without compromising privacy. In VLDB, pages 763–774, 2006.Google Scholar
  11. 11.
    P. Samarati. Protecting respondents’ identities in microdata release. TKDE, 13(6):1010–1027, 2001.Google Scholar
  12. 12.
    L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):571–588, 2002.zbMATHCrossRefMathSciNetGoogle Scholar
  13. 13.
    K. Wang, B. C. M. Fung, and P. S. Yu. Template-based privacy preservation in classification problems. In ICDM, pages 466–473, 2005.Google Scholar
  14. 14.
    K. Wang, P. S. Yu, and S. Chakraborty. Bottom-up generalization: A data mining solution to privacy protection. In ICDM, pages 249–256, 2004.Google Scholar
  15. 15.
    X. Xiao and Y. Tao. Personalized privacy preservation. In SIGMOD, pages 229–240, 2006.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Yufei Tao
    • 1
  • Xiaokui Xiao
    • 1
  1. 1.Department of Computer Science and EngineeringChinese University of Hong KongLexingtonChina

Personalised recommendations