Abstract
In recent years, a privacy model called k-anonymity has gained popularity in the microdata releasing. As the microdata may contain multiple sensitive attributes about an individual, the protection of multiple sensitive attributes has become an important problem. Different from the existing models of single sensitive attribute, extra associations among multiple sensitive attributes should be invested. Two kinds of disclosure scenarios may happen because of logical associations. The Q&S Diversity is checked to prevent the foregoing disclosure risks, with an α Requirement definition used to ensure the diversity requirement. At last, a two-step greedy generalization algorithm is used to carry out the multiple sensitive attributes processing which deal with quasi-identifiers and sensitive attributes respectively. We reduce the overall distortion by the measure of Masking SA.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bettini, C., Wang, X.S., Jajodia, S.: The role of quasi-identifiers in k-anonymity revisited. Technical Report N. RT-11-06 DICo - University of Milan, Italy (2006)
Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymity. In: Proc of the ICDE (2005)
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Samarati. k-Anonymity. In: Secure Data Management in Decentralized Systems (2007)
Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: Proc of ICDE (April 2005)
Iyengar, V.: Transforming data to satisfy privacy constraints. In: Proc of SIGKDD (2002)
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymit. In: Proc of ICDE (2006)
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proc of ICDE (2006)
Sweeney, L.: K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems (2002)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int’l Journal on Uncertainty, Fuzziness, and Knowledge-based Systems (2002)
Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. on Knowledge and Data Engineering (2001)
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, CMU, SRI (1998)
Wang, K., Yu, P., Chakraborty, S.: Bottom-up generalization: A data mining solution to privacy protection. In: Perner, P. (ed.) ICDM 2004. LNCS (LNAI), vol. 3275, Springer, Heidelberg (2004)
Willenborg, L., deWaal, T.: Elements of Statistical Disclosure Control. Lecture Notes in Statistics. Springer, Heidelberg (2000)
Wang, K., Fung, B.C.M, Yu, P.S.: Template-based privacy preservation in classifica-tion problems. In: Proc of ICDM 2005 (2005)
Wong, R.C.-W., Li, J., Fu, A.W.-C., Wang, K.: α,k-Anonymity: An Enhanced k-Anonymity Model for Privacy-Preserving Data Publishing. In: Proc of KDD 2006 (2006)
Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.-C.: Utility-Based Anonymization Using Local Recoding. In: Proc of KDD 2006 (2006)
Xiao, X., Tao, Y.: Personalized Privacy Preservation. In: Proc of the SIGMOD (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, Z., Ye, X. (2007). Privacy Protection on Multiple Sensitive Attributes. In: Qing, S., Imai, H., Wang, G. (eds) Information and Communications Security. ICICS 2007. Lecture Notes in Computer Science, vol 4861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77048-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-77048-0_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77047-3
Online ISBN: 978-3-540-77048-0
eBook Packages: Computer ScienceComputer Science (R0)