Abstract
In past years, many anonymization schemes, anonymity notions, and anonymity measures have been proposed. When designing information systems that feature anonymity, choosing a good approach is a very important design choice. While experiments comparing such approaches are enlightening, carrying out such experiments is a complex task and is labor-intensive. To address this issue, we propose the framework FACTS for the experimental evaluation of anonymization schemes. It lets researchers implement their approaches against interfaces and other standardizations that we have devised. Users can then define benchmark suites that refer to those implementations. FACTS gives way to comparability, and it includes many useful features, e.g., easy sharing and reproduction of experiments. We evaluate FACTS (a) by specifying and executing a comprehensive benchmark suite for data publishing and (b) by means of a user study. Core results are that FACTS is useful for a broad range of scenarios, that it allows to compare approaches with ease, and that it lets users share and reproduce experiments.
Chapter PDF
Similar content being viewed by others
References
Abramov, J., Sturm, A., Shoval, P.: A Pattern Based Approach for Secure Database Design. In: Salinesi, C., Pastor, O. (eds.) CAiSE Workshops 2011. LNBIP, vol. 83, pp. 637–651. Springer, Heidelberg (2011)
Barhamgi, M., Benslimane, D., Oulmakhzoune, S., Cuppens-Boulahia, N., Cuppens, F., Mrissa, M., Taktak, H.: Secure and Privacy-Preserving Execution Model for Data Services. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 35–50. Springer, Heidelberg (2013)
Bonnet, P., et al.: Repeatability and workability evaluation of SIGMOD 2011. ACM SIGMOD Record 40(2) (2011)
Burghardt, T., Buchmann, E., Müller, J., Böhm, K.: Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2009, Part I. LNCS, vol. 5870, pp. 304–321. Springer, Heidelberg (2009)
Ceselli, A., et al.: Modeling and Assessing Inference Exposure in Encrypted Databases. TISSEC 8(1) (2005)
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)
Heidinger, C., et al.: Efficient and secure exact-match queries in outsourced databases. World Wide Web (2013)
Heidinger, C., et al.: FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing (Extended Version). Technical report, Karlsruhe Institute of Technology, KIT (2013), http://digbib.ubka.uni-karlsruhe.de/volltexte/1000037502
Kifer, D., Machanavajjhala, A.: No Free Lunch in Data Privacy. In: SIGMOD (2011)
Kifer, D., Machanavajjhala, A.: A Rigorous and Customizable Framework for Privacy. In: PODS (2012)
Li, T., Li, N.: On the Tradeoff Between Privacy and Utility in Data Publishing. In: KDD (2009)
Machanavajjhala, A., et al.: l-Diversity: Privacy Beyond k-Anonymity. In: ICDE (2006)
Peters, I.: Folksonomies: Indexing and Retrieval in the Web 2.0. Walter de Gruyter (2009)
Samarati, P.: Protecting Respondents’ Identities in Microdata Release. TKDE 13(6) (2001)
Vandewalle, P., et al.: Reproducible research in signal processing. SPM 26(3) (2009)
Wang, H., Liu, R.: Privacy-preserving publishing microdata with full functional dependencies. DKE 70(3) (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Heidinger, C., Böhm, K., Buchmann, E., Richter, K. (2014). FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing. In: Jarke, M., et al. Advanced Information Systems Engineering. CAiSE 2014. Lecture Notes in Computer Science, vol 8484. Springer, Cham. https://doi.org/10.1007/978-3-319-07881-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-07881-6_9
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07880-9
Online ISBN: 978-3-319-07881-6
eBook Packages: Computer ScienceComputer Science (R0)