Skip to main content

ρ-uncertainty Anonymization by Partial Suppression

  • Conference paper
Database Systems for Advanced Applications (DASFAA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8422))

Included in the following conference series:

Abstract

We present a novel framework for set-valued data anonymization by partial suppression regardless of the amount of background knowledge the attacker possesses, and can be adapted to both space-time and quality-time trade-offs in a “pay-as-you-go” approach. While minimizing the number of item deletions, the framework attempts to either preserve the original data distribution or retain mineable useful association rules, which targets statistical analysis and association mining, two major data mining applications on set-valued data.

Kenny Q. Zhu is the contact author and is supported by NSFC grants 61100050, 61033002, 61373031 and Google Faculty Research Award.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: KDEX (1999)

    Google Scholar 

  2. Brijs, T., Swinnen, G., Vanhoof, K., Wets, G.: Using association rules for product assortment decisions: A case study. In: Knowledge Discovery and Data Mining, pp. 254–260 (1999)

    Google Scholar 

  3. Cao, J., Karras, P., Raïssi, C., Tan, K.-L.: ρ-uncertainty: inference-proof transaction anonymization. In: VLDB, pp. 1033–1044 (2010)

    Google Scholar 

  4. Chen, R., Mohammed, N., Fung, B.C.M., Desai, B.C., Xiong, L.: Publishing set-valued data via differential privacy. VLDB, 1087–1098 (2011)

    Google Scholar 

  5. Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Fisher, K., Walker, D., Zhu, K.Q., White, P.: From dirt to shovels: Fully automatic tool generation from ad hoc data. In: POPL, pp. 421–434 (2008)

    Google Scholar 

  7. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. (2010)

    Google Scholar 

  8. Ghinita, G., Kalnis, P., Tao, Y.: Anonymous publication of sensitive transactional data. TKDE, 161–174 (2011)

    Google Scholar 

  9. He, Y., Naughton, J.F.: Anonymization of set-valued data via top-down, local generalization. VLDB, 934–945 (2009)

    Google Scholar 

  10. Jaccard, P.: The distribution of the flora in the alphine zone. New Phytologist 11, 37–50 (1912)

    Article  Google Scholar 

  11. Kullback, S., Leibler, R.A.: On information and sufficiency. Annals of Mathematical Statistics 21(1), 79–86 (1951)

    Article  MathSciNet  Google Scholar 

  12. Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 557–570 (2002)

    Google Scholar 

  13. Terrovitis, M., Liagouris, J., Mamoulis, N., Skiadopoulos, S.: Privacy preservation by disassociation. PVLDB (2012)

    Google Scholar 

  14. Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. VLDB, 115–125 (2008)

    Google Scholar 

  15. Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. TKDE, 434–447 (2004)

    Google Scholar 

  16. Wu, Y.-H., Chiang, C.-M., Chen, A.L.P.: Hiding sensitive association rules with limited side effects. TKDE, 29–42 (2007)

    Google Scholar 

  17. Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: PVLDB, pp. 139–150 (2006)

    Google Scholar 

  18. Xu, Y., Wang, K., Fu, A.W.-C., Yu, P.S.: Anonymizing transaction databases for publication. In: KDD, pp. 767–775 (2008)

    Google Scholar 

  19. Zhang, Q., Koudas, N., Srivastava, D., Yu, T.: Aggregate query answering on anonymized tables. In: ICDE, pp. 116–125 (2007)

    Google Scholar 

  20. Zheng, Z., Kohavi, R., Mason, L.: Real world performance of association rule algorithms. In: KDD, pp. 401–406 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Jia, X., Pan, C., Xu, X., Zhu, K.Q., Lo, E. (2014). ρ-uncertainty Anonymization by Partial Suppression. In: Bhowmick, S.S., Dyreson, C.E., Jensen, C.S., Lee, M.L., Muliantara, A., Thalheim, B. (eds) Database Systems for Advanced Applications. DASFAA 2014. Lecture Notes in Computer Science, vol 8422. Springer, Cham. https://doi.org/10.1007/978-3-319-05813-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05813-9_13

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05812-2

  • Online ISBN: 978-3-319-05813-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics