Skip to main content

Part of the book series: Studies in Big Data ((SBD,volume 28))

Abstract

A good masking method is the one that avoids disclosure with low information loss, or that achieves a good trade-off between disclosure risk and information loss. In this chapter we describe tools to help in the selection of a masking method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rodoreda, M.: Mirall trencat, Club editor (1974)

    Google Scholar 

  2. Domingo-Ferrer, J., Torra, V.: A quantitative comparison of disclosure control methods for microdata. In: Doyle, P., Lane, J.I., Theeuwes, J.J.M., Zayatz, L. (eds.) Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, pp. 111–134. North-Holland (2001)

    Google Scholar 

  3. Marés, J., Torra, V., Shlomo, N.: Optimisation-based study of data privacy by using PRAM. In: Navarro-Arribas, G., Torra, V. (eds.) Advanced Research in Data Privacy, pp. 83–108. Springer (2015)

    Google Scholar 

  4. Torra, V., Narukawa, Y.: Modeling Decisions: Information Fusion and Aggregation Operators. Springer (2007)

    Google Scholar 

  5. Beliakov, G., Pradera, A., Calvo, T.: Aggregation Functions: A Guide For Practitioners. Springer (2007)

    Google Scholar 

  6. Grabisch, M., Marichal, J.-L., Mesiar, R., Pap, E.: Aggregation Functions. Encyclopedia of Mathematics and its Applications, no. 127. Cambridge University Press (2009)

    Google Scholar 

  7. Duncan, G.T., Keller-McNulty, S.A., Stokes, S.L.: Disclosure risk vs. data utility: the R-U confidentiality map. Technical report 121, National Institute of Statistical Sciences (2001)

    Google Scholar 

  8. Duncan, G.T., Keller-McNulty, S.A., Stokes, S.L.: Database security and confidentiality: examining disclosure risk vs. data utility through the R-U confidentiality map. Technical report 142, National Institute of Statistical Sciences (2001)

    Google Scholar 

  9. Torra, V.: Privacy in data mining. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 687–716. Springer (2010)

    Google Scholar 

  10. Sebe, F., Domingo-Ferrer, J., Mateo-Sanz, J.M., Torra, V.: Post-masking optimization of the tradeoff between information loss and disclosure risk in masked microdata sets. In: Inference Control in Statistical Databases. LNCS, vol. 2316, pp. 187–196 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vicenç Torra .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Torra, V. (2017). Selection of Masking Methods. In: Data Privacy: Foundations, New Developments and the Big Data Challenge. Studies in Big Data, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-57358-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57358-8_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57356-4

  • Online ISBN: 978-3-319-57358-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics