PUMA
Istituto di Scienza e Tecnologie dell'Informazione     
Atzori M. Weak k-anonymity: a low-distortion model for protecting privacy. In: Information Security. 9th International Conference, ISC 2006 (Samos Island, Greece, August 30 - September 2 2006). Proceedings, pp. 60 - 71. Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel (eds.). (Lecture Notes in Computer Science, vol. 4176). Springer, 2006.
 
 
Abstract
(English)
Sharing microdata tables is a primary concern in today information society. Privacy issues can be an obstacle to the free flow of such information. In recent years, disclosure control techniques have been developed to modify microdata tables in order to be anonymous. The k-anonymity framework has been widely adopted as a standard technique to remove links between public available identifiers (such as full names) and sensitive data contained in the shared tables. In this paper we give a weaker definition of k-anonymity, allowing lower distortion on the anonymized data. We show that, under the hypothesis in which the adversary is not sure a priori about the presence of a person in the table, the privacy properties of k-anonymity are respected also in the weak k-anonymity framework. Experiments on real-world data show that our approach outperforms k-anonymity in terms of distortion introduced in the released data by the algorithms to enforce anonymity.
URL: http://www.springerlink.com/content/a3g5275745l87332/fulltext.pdf
Subject Privacy
H.2.8 Database Applications. Statistical databases


Icona documento 1) Download Document PDF


Icona documento Open access Icona documento Restricted Icona documento Private

 


Per ulteriori informazioni, contattare: Librarian http://puma.isti.cnr.it

Valid HTML 4.0 Transitional