Skip to main content

Decomposition+: Improving ℓ-Diversity for Multiple Sensitive Attributes

  • Conference paper

Abstract

In this paper, we analyse existing privacy-transformation techniques in the field of PPDP that anonymize datasets with Multiple Sensitive Attributes (MSA). Of these, we present an analysis of Decomposition, an algorithm which generates a dataset with distinct ℓ-diversity over MSA using a partitioning approach. We discuss some improvements which can be made over Decomposition: in the realms of its running time, its data utility, and its applicability in the case of Multiple Release Publishing. To this effect, we describe Decomposition+ an algorithm that implements some of these improvements and is thus more suited for use in real-life scenarios.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: Proceedings of the 32nd Intl. Conference on Very Large Data Bases, VLDB Endowment, pp. 139–150 (2006)

    Google Scholar 

  2. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A Survey of Recent Developments. ACM Computing Surveys 42, 1–53 (2010)

    Article  Google Scholar 

  3. Aggarwal, C.C., Yu, P.S. (eds.): Privacy-Preserving Data Mining. Advances in Database Systems, vol. 34. Springer, US (2008)

    Google Scholar 

  4. Sweeney, L.: k-anonymity: A Model for Protecting Privacy. Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10, 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  5. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD) 1, 3 (2007)

    Article  Google Scholar 

  6. Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, vol. (2). IEEE (2007)

    Google Scholar 

  7. Sweeney, L.: Achieving k-Anonymity Privacy Protection Using Generalization And Suppression. Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10, 571–588 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  8. Frank, A., Asuncion, A.: UCI Machine Learning Repository (2010)

    Google Scholar 

  9. Zhao, V., Wang, J., Luo, Y., Lei, J.: (α, β, k)-anonymity: An effective privacy preserving model for databases. In: 2009 Intl. Conference on Test and Measurement, pp. 412–415. IEEE (2009)

    Google Scholar 

  10. Venkatasubramanian, S.: Closeness: A New Privacy Measure for Data Publishing. IEEE Trans. on Knowledge and Data Engineering 22, 943–956 (2010)

    Article  Google Scholar 

  11. Ye, Y., Liu, Y., Wang, C., Lv, D., Feng, J.: Decomposition: Privacy Preservation for Multiple Sensitive Attributes. In: Zhou, X., Yokota, H., Deng, K., Liu, Q. (eds.) DASFAA 2009. LNCS, vol. 5463, pp. 486–490. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Gal, T.S., Chen, Z., Gangopadhyay, A.: A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes. Intl. Journal of Information Security and Privacy 2, 28–44 (2008)

    Article  Google Scholar 

  13. Yang, X.C., Wang, Y.Z., Wang, B., Yu, G.: Privacy preserving approaches for multiple sensitive attributes in data publishing. Jisuanji Xuebao/Chinese Journal of Computers 31, 574–587 (2008)

    Google Scholar 

  14. Zhang, Q., Koudas, N., Srivastava, D., Yu, T.: Aggregate Query Answering on Anonymized Tables. In: 2007 IEEE 23rd Intl. Conference on Data Engineering, pp. 116–125. IEEE (2007)

    Google Scholar 

  15. Xiao, X., Tao, Y.: Anatomy: Privacy and Correlation Preserving Publication. Technical Report i, Chinese University of Hong Kong, Hong Kong (2006)

    Google Scholar 

  16. Byun, J., Sohn, Y., Bertino, E., Li, N.: Secure Anonymization for Incremental Datasets. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 48–63. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Das, D., Bhattacharyya, D.K. (2012). Decomposition+: Improving ℓ-Diversity for Multiple Sensitive Attributes. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Engineering. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27308-7_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27308-7_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27307-0

  • Online ISBN: 978-3-642-27308-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics