k-ARQ: k-Anonymous Ranking Queries

  • Eunjin Jung
  • Sukhyun Ahn
  • Seung-won Hwang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5981)


With the advent of an unprecedented magnitude of data, top-k queries have gained a lot of attention. However, existing work to date has focused on optimizing efficiency without looking closely at privacy preservation. In this paper, we study how existing approaches have failed to support a combination of accuracy and privacy requirements and we propose a new data publishing framework that supports both areas. We show that satisfying both requirements is an essential problem and propose two comprehensive algorithms. We also validated the correctness and efficiency of our approach using experiments.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Fagin, R., Lote, A., Naor, M.: Optimal aggregation algorithms for middleware. In: PODS (2001)Google Scholar
  2. 2.
    Guentzer, U., Balke, W., Kiessling, W.: Optimizing multi-feature queries in image databases. In: VLDB (2000)Google Scholar
  3. 3.
    Bruno, N., Gravano, L., Marian, A.: Evaluating top-k queries over web-accessible databases. In: ICDE (2002)Google Scholar
  4. 4.
    Hwang, S., Chang, K.C.C.: Optimizing access cost for top-k queries over web sources: A unified cost-based approach. In: ICDE (2005)Google Scholar
  5. 5.
    Sweeney, L.: K-anonymity:a model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge-based Systems (2002)Google Scholar
  6. 6.
    Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM TKDD 1(1), 3 (2007)CrossRefGoogle Scholar
  7. 7.
    Xiao, X., Tao, Y.: M-invariance: towards privacy preserving re-publication of dynamic data sets. In: The 2007 ACM SIGMOD (2007)Google Scholar
  8. 8.
    Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE (2007)Google Scholar
  9. 9.
    Vaidya, J., Clifton, C.: Privacy-preserving top-k queries. In: ACM SIGMOD (2005)Google Scholar
  10. 10.
    Muthukrishnan, S., Poosala, V., Suel, T.: On rectangular partitionings in two dimensions. In: ICDT (1999)Google Scholar
  11. 11.
    LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE (2006)Google Scholar
  12. 12.
    Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: IEEE S&P (1998)Google Scholar
  13. 13.
    Ahn, S., Hwang, S.W., Jung, E.: k-anonymous ranking queries. Technical Report TR09-04, Dept. of Computer Science, The University of Iowa (September 2009)Google Scholar
  14. 14.
    Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu, A.: Achieving anonymity via clustering. In: PODS (2006)Google Scholar
  15. 15.
    Miller, J., Campan, A., Truta, T.M.: Constrained k-anonymity:privacy with generalization boundaries. In: P3DM (2008)Google Scholar
  16. 16.
    Wong, R.C.W., Li, J., Fu, A.W.C., Wang, K.: (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: The 12th ACM SIGKDD (2006)Google Scholar
  17. 17.
    Sun, X., Wang, H., Li, J., Truta, T.M., Li, P.: (p+, α)-sensitive k-anonymity: a new enhanced privacy protection model. In: The 8th IEEE ICCIT (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Eunjin Jung
    • 1
  • Sukhyun Ahn
    • 2
  • Seung-won Hwang
    • 2
  1. 1.Dept. of Computer ScienceThe University of Iowa 
  2. 2.Dept. of Computer Science and EngineeringPohang University of Science and Technology (POSTECH) 

Personalised recommendations