Skip to main content
Log in

Integrated exact, hybrid and metaheuristic learning methods for confidentiality protection

  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

A vital task facing government agencies and commercial organizations that report data is to represent the data in a meaningful way and simultaneously to protect the confidentiality of critical components of this data. The challenge is to organize and disseminate data in a form that prevents such critical components from being inferred by groups bent on corporate espionage, to gain competitive advantages, or having a desire to penetrate the security of the information underlying the data. Controlled tabular adjustment is a recently developed approach for protecting sensitive information by imposing a special form of statistical disclosure limitation on tabular data. The underlying model gives rise to a mixed integer linear programming problem involving both continuous and discrete (zero-one) variables. We develop stratified ordered (s-ordered) heuristics and a new meta-heuristic learning approach for solving this model, and compare their performance to previous heuristics and to an exact algorithm embodied in the state-of-the-art ILOG- CPLEX software. Our new approaches are based on partitioning the problem into its discrete and continuous components, first creating an s-ordered heuristic that reduces the number of binary variables through a grouping procedure that combines an exact mathematical programming model with constructive heuristics. To gain further advantages we then replace the mathematical programming model with an evolutionary scatter search approach that makes it possible to extend the method to large problems with over 9000 entries. Finally, we introduce a new metaheuristic learning method that significantly improves the quality of solutions obtained.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Cox, L. H. (1980). Suppression methodology and statistical disclosure control. Journal of the American Statistical Association, 75, 377–385.

    Article  Google Scholar 

  • Cox, L. H. (1981). Linear sensitivity measures in statistical disclosure control. Journal of Statistical Planning and Inference, 5, 153–164.

    Article  Google Scholar 

  • Cox, L. H. (2000). Discussion (on Session 49: Statistical disclosure control for establishment data). In ICES II: The second international conference on establishment surveys–survey methods for businesses, farms and institutions (pp. 904–907). Invited Papers, Alexandria, VA: American Statistical Association.

  • Cox, L. H. (2001). Disclosure risk for tabular economic data. In P. Doyle, J. I. Lane, J. J. M. Theeuwes, & L. V. Zayatz (Eds.), Confidentiality, disclosure and data access: Theory and practical applications for statistical agencies (pp. 167–184). Amsterdam: North-Holland.

    Google Scholar 

  • Cox, L. H., & Danderkar, R. A. (2004). A disclosure limitation method for tabular data that preserves accuracy and ease-of-use. In Proceedings of the 2002 FCSM statistical policy conference (pp. 15–30). Washington: Office of Management and Budget.

    Google Scholar 

  • Cox, L. H., & Kelly, J. P. (2004). Balancing data quality and confidentiality for tabular data. In Monographs of official statistics. Proceedings of the UNECE/EUROSTAT Work Session on Statistical Data Confidentiality, Luxembourg, 7–9 April, 2003 (pp. 11–23). Luxembourg: Eurostat.

    Google Scholar 

  • Cox, L. H., Kelly, J. P., & Patil, R. J. (2004). Preserving quality and confidentiality for multivariate tabular data. In Lecture notes in computer science : Vol. 3050. Proceedings of privacy in statistical databases 2004 (PSD 2004), Barcelona, 9–11 June, 2004 (pp. 87–98). New York: Springer.

    Google Scholar 

  • Cox, L. H., Kelly, J. P., & Patil, R. J. (2005). Computational aspects of controlled tabular adjustment: Algorithm and analysis. In B. Golden, S. Raghavan, & E. Wasil (Eds.), The next wave in computer, optimization and decision technologies (pp. 45–59). Boston: Kluwer.

    Chapter  Google Scholar 

  • Danderkar, R. A., & Cox, L. H. (2002). Synthetic tabular data-an alternative to complementary cell suppression. Manuscript.

  • Fischetti, M., & Salazar, J. J. (1999). Models and algorithms for the 2-dimensional cell suppression problem in statistical disclosure control. Mathematical Programming, 84, 283–312.

    Google Scholar 

  • Fischetti, M., & Salazar, J. J. (2000). Solving the cell suppression problem on tabular data with linear constraints. Management Science, 47, 1008–1026.

    Article  Google Scholar 

  • Glover, F. (2006). Parametric tabu search methods for mixed integer programming. Computers and Operations Research, 33(9), 2449–2494.

    Article  Google Scholar 

  • Glover, F., & Laguna, M. (1997). Tabu search. Boston: Kluwer.

    Google Scholar 

  • Glover, F., Amini, M., & Kochenberger, G. (2004). Parametric ghost image processes for fixed-charge problems: A study of transportation networks. Journal of Heuristics, 11(4), 307–336.

    Article  Google Scholar 

  • Karger, D. R. (1999). Random sampling in cut, flow, and network design problems. Mathematics of Operations Research, 24(2), 383–413.

    Article  Google Scholar 

  • Kelly, J., Golden, B., & Assad, A. (1992). Cell suppression: Disclosure protection for sensitive tabular data. Networks, 22, 397–417.

    Article  Google Scholar 

  • Laguna, M., & Marti, R. (2003). Scatter search: Methodology and implementations in C. Boston: Kluwer.

    Google Scholar 

  • Lewis, M. W. (2004). Solving fixed charge multi-commodity network design problems using guided design search. University of Mississippi, Hearin Center Technical Report, HCES-01-04.

  • Montgomery, D. C. (1984). Design and analysis of experiments. New York: Wiley.

    Google Scholar 

  • Willenborg, L., & de Waal, T. D. (1996). Lecture notes in statistics : Vol. 111. Statistical disclosure control in practice. New York: Springer.

    Google Scholar 

  • Willenborg, L., & de Waal, T. D. (2001). Lecture notes in statistics : Vol. 155. Elements of statistical disclosure control. New York: Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rahul Patil.

Additional information

An earlier, incomplete, and abbreviated version of this paper appears with the title “Exact, Heuristic and Metaheuristic Methods for Confidentiality Protection by Controlled Tabular Adjustment,” International Journal of Operations Research, Vol. 5, No. 2, pp. 117–128, 2008.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Glover, F., Cox, L.H., Patil, R. et al. Integrated exact, hybrid and metaheuristic learning methods for confidentiality protection. Ann Oper Res 183, 47–73 (2011). https://doi.org/10.1007/s10479-009-0574-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-009-0574-8

Keywords

Navigation