Journal of Combinatorial Optimization

, Volume 22, Issue 1, pp 97–119

Anonymizing binary and small tables is hard to approximate

  • Paola Bonizzoni
  • Gianluca Della Vedova
  • Riccardo Dondi
Article

Abstract

The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization recently proposed is the k-anonymity. This approach requires that the rows in a table are clustered in sets of size at least k and that all the rows in a cluster become the same tuple, after the suppression of some records. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be NP-hard when the values are over a ternary alphabet, k=3 and the rows length is unbounded. In this paper we give a lower bound on the approximation factor that any polynomial-time algorithm can achieve on two restrictions of the problem, namely (i) when the records values are over a binary alphabet and k=3, and (ii) when the records have length at most 8 and k=4, showing that these restrictions of the problem are APX-hard.

k-anonymity APX-hardness Computational complexity Clustering 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aggarwal G, Feder T, Kenthapadi K, Khuller S, Panigrahy R, Thomas D, Zhu A (2006) Achieving anonymity via clustering. In: Vansummeren S (ed) PODS. ACM, New York, pp 153–162 Google Scholar
  2. Aggarwal G, Feder T, Kenthapadi K, Motwani R, Panigrahy R, Thomas D, Zhu A (2005) Anonymizing tables. In: Eiter T, Libkin L (eds) ICDT. Lecture notes in computer science, vol 3363. Springer, Berlin, pp 246–258 CrossRefGoogle Scholar
  3. Aggarwal G, Kenthapadi K, Motwani R, Panigrahy R, Thomas D, Zhu A (2005) Approximation algorithms for k-anonymity. J Priv Technol 2 Google Scholar
  4. Alimonti P, Kann V (2000) Some APX-completeness results for cubic graphs. Theor Comput Sci 237(1–2):123–134 MathSciNetMATHCrossRefGoogle Scholar
  5. Ausiello G, Crescenzi P, Gambosi V, Kann G, Marchetti-Spaccamela A, Protasi M (1999) Complexity and approximation: combinatorial optimization problems and their approximability properties. Springer, Berlin MATHGoogle Scholar
  6. Chaytor R, Evans PA, Wareham T (2008) Fixed-parameter tractability of anonymizing data by suppressing entries. In: Yang B, Du D-Z, Wang CA (eds) COCOA. Lecture notes in computer science, vol 5165. Springer, Berlin, pp 23–31 Google Scholar
  7. Gasieniec L, Jansson J, Lingas A (2004) Approximation algorithms for hamming clustering problems. J Discrete Algorithms 2(2):289–301 MathSciNetMATHCrossRefGoogle Scholar
  8. Gionis A, Tassa T (2007) k-anonymization with minimal loss of information. In: Arge L, Hoffmann M, Welzl E (eds) ESA. Lecture notes in computer science, vol 4698. Springer, Berlin, pp 439–450 Google Scholar
  9. Li M, Ma B, Wang L (2002) Finding similar regions in many sequences. J Comput Syst Sci 65(1):73–96 MathSciNetCrossRefGoogle Scholar
  10. Park H, Shim K (2007) Approximate algorithms for k-anonymity. In: Chan CY, Ooi BC, Zhou A (eds) SIGMOD Conference. ACM, New York, pp 67–78 Google Scholar
  11. Samarati P (2001) Protecting respondents’ identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010–1027 CrossRefGoogle Scholar
  12. Samarati P, Sweeney L (1998) Generalizing data to provide anonymity when disclosing information. In: PODS. ACM, New York, p 188 (abstract) Google Scholar
  13. Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557–570 MathSciNetMATHCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Paola Bonizzoni
    • 1
  • Gianluca Della Vedova
    • 2
  • Riccardo Dondi
    • 3
  1. 1.DISCoUniversità degli Studi di Milano-BicoccaMilanoItaly
  2. 2.Dipartimento di StatisticaUniversità degli Studi di Milano-BicoccaMilanoItaly
  3. 3.Dipartimento di Scienze dei Linguaggi, della Comunicazione e degli Studi CulturaliUniversità degli Studi di BergamoBergamoItaly

Personalised recommendations