Skip to main content

Pre-tabular Perturbation with Controlled Tabular Adjustment: Some Considerations

  • Conference paper
Privacy in Statistical Databases (PSD 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8744))

Included in the following conference series:

Abstract

Controlled Tabular Adjustment (CTA) has been developed as SDC method for tabular data. It aims at finding the closest additive table to a given original table ensuring that adjusted values of all confidential cells are safely away from their original value. In practice, it is usually not possible to process an entire publication as a single CTA application. This paper looks into possibilities of designing a sequential application of CTA yielding a protected micro-data set while controlling for the quality of estimates that would be derived from the protected data.

Supported by the FP7-INFRASTRUCTURES-2010-1 project “DwB-Data without Boundaries”, number 262608.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Castro, J.: Minimum-distance controlled perturbation methods for large-scale tabular data protection. European Journal of Operational Research 171, 39–52 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  2. Castro, J., Giessing, S.: Quality issues of minimum distance controlled tabular adjustment. paper presented at the European Conference on Quality in Survey Statistics (Q 2006), Cardiff, April 24-26 (2006)

    Google Scholar 

  3. Castro, J., Gonzalez, J.A.: A fast CTA method without thecomplicating binary deci-sions. Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality (2013), http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2013/Topic_1_Castro-Gonzalez.pdf

  4. Castro, J., Gonzalez, J.A., Baena, D., Jimenez, X.: User’s and programmer’s manual of the RCTA package (v.2), Technical Report DR 2013-06 (2013), http://www-eio.upc.es/~jcastro

  5. Cox, L., Dandekar, R.H.: ‘Synthetic Tabular Data – an Alternative to Complementary Cell Suppression (2002) (unpublished manuscript)

    Google Scholar 

  6. Cox, L.H., Kelly, J.P., Patil, R.: Balancing quality and confidentiality for multivariate tabular data. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 87–98. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Evans, B.T., Zayatz, L., Slanta, J.: Using noise for disclosure limitation for establishment tabular data. Journal of Official Statistics (14), S. 537–552 (1998)

    Google Scholar 

  8. Fraser, B., Wooton, J.: A proposed method for confidentialising tabular output to protect against differencing. Monographs of Official Statistics. Work session on Statistical Data Confidentiality, pp. 299–302. Eurostat-Office for Official Publications of the European Communities, Luxembourg (2006)

    Google Scholar 

  9. Giessing, S.: Flexible rounding based on consistent post-tabular stochastic noise. In: Domingo-Ferrer, J., Tinnirello, I. (eds.) PSD 2012. LNCS, vol. 7556, pp. 22–34. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  10. Hernández García, S., Salazar González, J.J.: Enhanced controlled tabular adjustment, Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality, http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2011/28_Salazar.pdf

  11. Höhne, J.: Verfahren zur Anonymisierung von Einzeldaten. Statistik und Wirtschaft, Bd. 16, Statistisches Bundesamt, Wiesbaden (2010), https://www.destatis.de/DE/Publikationen/StatistikWissenschaft/Band16_AnonymisierungEinzeldaten_1030816109004.pdf?__blob=publicationFile

  12. Massell, P., Funk, J.: Recent Developments in the Use of Noise for Protecting Magnitude Data Tables: Balancing to Improve Data Quality and Rounding that Preserves Protection. In: Proceedings of the Research Conference of the Federal Committee on Statistical Methodology, Arlington, Virginia (2007)

    Google Scholar 

  13. Nayak, T.K., Sinha, B., Zayatz, L.: Statistical Properties of Multiplicative Noise Masking for Confidentiality Protection. Statistical Research Division Research Report Series (Statistics #2010-05). U.S. Census Bureau (2010), http://www.census.gov/srd/papers/pdf/rrs2010-05.pdf

  14. Shlomo, N.: Statistical Disclosure Control Methods for Census Frequency Tables. International Statistical Review 75(2), 199–217 (2007)

    Article  Google Scholar 

  15. Shlomo, N., Young, C.: Statistical disclosure control methods through a risk-utility framework. In: Domingo-Ferrer, J., Franconi, L. (eds.) PSD 2006. LNCS, vol. 4302, pp. 68–81. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Thompson, G., Broadfoot, S., Elazar, D.: Methodology for the Automatic Confidentialisation of Statistical Outputs from Remote Servers at the Australian Bureau of Statistics. Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality (2013), http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2013/Topic_1_ABS.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Giessing, S. (2014). Pre-tabular Perturbation with Controlled Tabular Adjustment: Some Considerations. In: Domingo-Ferrer, J. (eds) Privacy in Statistical Databases. PSD 2014. Lecture Notes in Computer Science, vol 8744. Springer, Cham. https://doi.org/10.1007/978-3-319-11257-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11257-2_5

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11256-5

  • Online ISBN: 978-3-319-11257-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics