Skip to main content

Data Privacy: A Survey of Results

  • Chapter
  • First Online:
Advanced Research in Data Privacy

Part of the book series: Studies in Computational Intelligence ((SCI,volume 567))

Abstract

In this paper we present an overview of the results obtained by our research group within the area of data privacy. Results focus on data-driven problems (respondent and owner privacy with an unknown use) and user privacy. We have developed some new masking methods, developed methodologies for parameter selection, and developed some information loss and disclosure risk measures. We have also obtained important results on reidentification methods (record linkage) when used for disclosure risk assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Navarro-Arribas, G., Torra, V.: Information fusion in data privacy: a survey. Inf. Fusion 13(4), 235–244 (2012)

    Article  Google Scholar 

  2. Torra, V., Navarro-Arribas, G.: Data Privacy, WIREs Data Mining and Knowledge Discovery, in press (2014)

    Google Scholar 

  3. Doyle, P., Lane, J.I., Theeuwes, J.J.M., Zayatz, L. (eds.): Confidentiality. Disclosure and Data Access, Theory and Practical Applications for Statistical Agencies, North-Holland (2001)

    Google Scholar 

  4. Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Nordholt, E.S., Spicer, K., de Wolf, P.-P.: Statistical Disclosure Control. Wiley, New York (2012)

    Google Scholar 

  5. Torra, V.: Data Privacy, Springer, Berlin. See also http://www.ppdm.cat/dp (2014)

  6. Vaidya, J., Clifton, C.: Zhu, M.: Privacy Preserving Data Mining, Springer (2006)

    Google Scholar 

  7. Willenborg, L., de Waal, T.: Elements of Statistical Disclosure Control. Lecture Notes in Statistics, Springer, Berlin (2001)

    Google Scholar 

  8. Domingo-Ferrer, J., Torra, V.: Disclosure control methods and information loss for microdata. In: Doyle, P., Lane, J.I., Theeuwes, J.J.M., Zayatz, L. (eds.) Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies, pp. 91–110. Elsevier Science (2001)

    Google Scholar 

  9. Domingo-Ferrer, J., Torra, V.: A quantitative comparison of disclosure control methods for microdata. In: Doyle, P., Lane, J.I., Theeuwes, J.J.M., Zayatz, L. (eds.) Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, pp. 111–134. North-Holland (2001)

    Google Scholar 

  10. Elliot, M.J., Skinner, C.J., Dale, A.: Special uniqueness. random uniques and sticky populations: some counterintuitive effects of geographical detail on disclosure risk. Res. Official Stat. 1(2), 53–67 (1998)

    Google Scholar 

  11. Winkler, W.E.: Re-identification methods for masked microdata, PSD 2004. Lect. Notes Comput. Sci. 3050, 216–230 (2004)

    Article  Google Scholar 

  12. Jimenez, J., Marés, J., Torra, V.: An evolutionary approach to enhance data privacy. Soft Comput. 15(7), 1301–1311 (2011)

    Google Scholar 

  13. Marés, J., Torra, V.: An Evolutionary Algorithm to Enhance Multivariate Post-Randomization Method (PRAM) Protections, Information Sciences, in press (2014)

    Google Scholar 

  14. Stokes, K., Torra, V.: Multiple releases of \(k\)-anonymous data sets and \(k\)-anonymous relational databases. Int. J. Unc. Fuzziness Knowl. Based Syst. 20(6), 839–853 (2012)

    Google Scholar 

  15. Nin, J., Torra, V.: Towards the evaluation of time series protection methods. Inf. Sci. 179(11), 1663–1677 (2009)

    Article  MATH  Google Scholar 

  16. Martínez-Bea, S., Torra, V.: Trajectory anonymization from a time series perspective. In: Proceedings IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), pp. 401–408 (2011)

    Google Scholar 

  17. Navarro-Arribas, G., Torra, V., Erola, A., Castellà-Roca, J.: User k-anonymity for privacy preserving data mining of query logs. Inf. Process. Manage. 48(3), 476–487 (2012)

    Article  Google Scholar 

  18. Navarro-Arribas, G., Torra, V.: Tree-based Microaggregation for the Anonymization of Search Logs. In: 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (Workshop on Soft approaches to information access on the Web), vol. 3, Milan, Italy, IEEE, pp. 155–158 (2009)

    Google Scholar 

  19. Navarro-Arribas, G., Torra, V.: Privacy-preserving data-mining through microaggregation for web-based e-commerce. Internet Res. 20(3), 366–384 (2010)

    Article  Google Scholar 

  20. Abril, D., Navarro-Arribas, G., Torra, V.: Vector space model anonymization. In: Proceedings of CCIA (2013)

    Google Scholar 

  21. Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: An algorithm for \(k\)-degree anonymity on large networks. In: Proceedings of 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2013)

    Google Scholar 

  22. Nettleton, D. F., Torra, V., Dries, A.: The effect of constraints on information loss and risk for clustering and modification based graph anonymization methods, arXiv preprint arXiv:1401.0458 (2014)

  23. Stokes, K., Torra, V.: Reidentification and k-anonymity: a model for disclosure risk in graphs. Soft Comput. 16(10), 1657–1670 (2012)

    Article  MATH  Google Scholar 

  24. Sebé, F., Domingo-Ferrer, J., Mateo-Sanz, J.M., Torra, V.: Post-masking optimization of the tradeoff between information loss and disclosure risk in masked microdata sets. Lect. Notes Comput. Sci. 2316, 187–196 (2002)

    Google Scholar 

  25. Marés, J., Torra, V., Shlomo, N.: Optimisation-Based Study of Data Privacy by Using PRAM. Chapter 6, Advanced Research on Data Privacy. Springer, Berlin (2014)

    Google Scholar 

  26. De Wolf, P.P., Van Gelder, I.: An empirical evaluation of PRAM. Discussion paper 04012. Statistics Netherlands, Voorburg/Heerlen (2004)

    Google Scholar 

  27. Gouweleeuw, J.M., Kooiman, P., Willenborg, L.C.R.J., De Wolf, P.-P.: Post Randomisation for Statistical Disclosure Control: Theory and Implementation’, Journal of Official Statistics, vol. 14, pp. 4 463–478. Also as Research Paper No. 9731. Statistics Netherlands, Voorburg (1997)

    Google Scholar 

  28. Gross, B., Guiblin, P., Merrett, K.: Implementing the Post Randomisation method to the individual sample of anonymised records (SAR) from the 2001 Census, paper presented at “The Samples of Anonymised Records, An Open Meeting on the Samples of Anonymised Records from the 2001 Census”. http://www.ccsr.ac.uk/sars/events/2004-09-30/gross.pdf (2004)

  29. Torra, V.: Constrained microaggregation: adding constraints for data editing. Trans. Data Priv. 1(2), 86–104 (2008)

    MathSciNet  Google Scholar 

  30. Cano, I., Torra, V.: Edit constraints on microaggregation and additive noise. Lect. Notes Comput. Sci. 6549, 1–14 (2011)

    Article  Google Scholar 

  31. Cano, I., Navarro-Arribas, G., Torra, V.: A new framework to automate constrained microaggregation. In: Proceedings PAVLAD Workshop in CIKM, pp. 1–8 (2009)

    Google Scholar 

  32. Shlomo, N., De Waal, T.: Protection of micro-data subjecto to edit constraints against statistical disclousure. J. Official Stat. 24(2), 229–253 (2008)

    Google Scholar 

  33. Nergiz, M.E., Clifton, C., Nergiz, A.E.: MultiRelational k-Anonymity. Proc. ICDE 2007, 1417–1421 (2007)

    Google Scholar 

  34. Nergiz, M.E., Clifton, C., Nergiz, A.E.: MultiRelational k-anonymity. IEEE Trans. Knowl. Data Eng. 21, 1104–1117 (2009)

    Google Scholar 

  35. Navarro-Arribas, G., Abril, D., Torra, V.: Dynamic anonymous index for confidential data. In: Proceedings DPM 2013. Lecture Notes in Computer Science, vol. 8247, pp. 362–368 (2014)

    Google Scholar 

  36. Cano, I., Torra, V.: Generation of synthetic data by means of fuzzy c-regression. In: Proceedings of FUZZ-IEEE, pp. 1145–1150 (2009)

    Google Scholar 

  37. Torra, V.: Rank swapping for partial orders and continuous variables. In: Proceedings ARES 2009, WAIS Workshop, pp. 888–893 (2009)

    Google Scholar 

  38. Nin, J., Torra, V.: Extending microaggregation procedures for time series protection. Lect. Notes Comput. Sci. 4259, 899–908 (2006)

    Article  MathSciNet  Google Scholar 

  39. Nin, J., Torra, V.: Distance based re-identification for time series. Analysis of distances. Lect. Notes Comput. Sci. 4302, 205–216 (2006)

    Google Scholar 

  40. Gómez-Alonso, C., Valls, A.: A similarity measure for sequences of categorical data based on the ordering of common elements. LNAI 5285, 134–145 (2008)

    Google Scholar 

  41. Valls, A., Gómez-Alonso, C., Torra, V.: Generation of prototypes for masking sequences of events. In: Proceedings ARES 2009, WAIS Workshop, pp. 947–952 (2009)

    Google Scholar 

  42. Valls, A., Nin, J., Torra, V.: On the use of aggregation operators for location privacy. In: Proceedings IFSA-EUSFLAT, pp. 489–494 (2009)

    Google Scholar 

  43. Barbaro, M., Zeller, T.: A Face Is Exposed for AOL Searcher No. 4417749, The New York Times, August 9, 2006. Retrieved April 25, 2010 (2006)

    Google Scholar 

  44. Erola, A., Castellà-Roca, J., Navarro-Arribas, G., Torra, V., (2011) Semantic microaggregation for the anonymization of query logs using the open directory project. SORT - Statistics and Operations Research Transactions, pp. 41–58.

    Google Scholar 

  45. Abril, D., Navarro-Arribas, G., Torra, V.: On the declassification of confidential documents. Lect. Notes Comput. Sci. 6820, 235–246 (2011)

    Article  Google Scholar 

  46. Nettleton, D., Abril, D.: Document sanitization: Measuring search engine information loss and risk of disclosure for the wikileaks cables, LNCS 7556 (2012)

    Google Scholar 

  47. Nettleton, D.F., Abril, D.: An Information Retrieval Approach to Document Sanitization. Chapter 9, Advanced Research on Data Privacy. Springer, Berlin (2014)

    Google Scholar 

  48. Marés, J., Torra, V.: On the protection of social networks user’s information. Knowl.-Based Syst. 49, 134–144 (2013)

    Google Scholar 

  49. Salas, J., Torra, V.: Approximating degree sequences with regular graphic sequences, manuscript (2014)

    Google Scholar 

  50. Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: A Summary of k-Degree Anonymous Methods for Privacy-Preserving on Networks. Chapter 13, Advanced Research on Data Privacy. Springer, Berlin (2014)

    Google Scholar 

  51. Torra, V., Shafie, T.: Data protection for online social networks and p-stability for graphs, manuscript (2014)

    Google Scholar 

  52. Stokes, K., Torra, V.: On some clustering approaches for graphs. In: Proceedings IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), pp. 409–415 (2011)

    Google Scholar 

  53. Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: Analyzing the impact of edge modications on networks. Lect. Notes Comput. Sci. 8234, 296–307 (2013)

    Article  Google Scholar 

  54. Nettleton, D.F., Torra, V., Dries, A.: A comparison of clustering and modification based graph anonymization methods with constraints. Int. J. Comput. Appl. (2014)

    Google Scholar 

  55. Cano, I., Ladra, S., Torra, V.: Evaluation of information loss for privacy preserving data mining through comparison of fuzzy partitions. In: Proceedings of FUZZ-IEEE 2010/WCCI (2010)

    Google Scholar 

  56. Marés, J., Torra, V.: Clustering-based categorical data protection. Lect. Notes Comput. Sci. 7556, 78–89 (2012)

    Article  Google Scholar 

  57. Herranz, J., Matwin, S., Nin, J., Torra, V.: Classifying data from protected statistical datasets. Comput. Secur. 29(8), 875–890 (2010)

    Article  Google Scholar 

  58. Torra, V., Carlson, M.: On the Hellinger distance for measuring information loss in microdata, UNECE / Eurostat Work Session on Statistical Confidentiality, 8th Work Session 2013. Ottawa, Canada (2013)

    Google Scholar 

  59. Torra, V., Stokes, K.: A formalization of re-identification in terms of compatible probabilities, arXiv preprint arXiv:1301.5022 (2013)

  60. Torra, V., Stokes, K.: A formalization of record linkage and its application to data protection. Int. J. Unc. Fuzziness Knowl. Based Syst. 20(6), 907–919 (2012)

    Google Scholar 

  61. Abril, D., Navarro-Arribas, G., Torra, V.: Improving record linkage with supervised learning for disclosure risk assessment. Inf. Fusion 13(4), 274–284 (2012)

    Article  Google Scholar 

  62. Torra, V., Navarro-Arribas, G., Abril, D.: Supervised learning for record linkage through weighted means and OWA operators. Control Cybern. 39(4), 1011–1026 (2010)

    MATH  Google Scholar 

  63. Abril, D., Navarro-Arribas, G., Torra, V.: Choquet integral for record linkage. Ann. Oper. Res. 195, 97–110 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  64. Abril, D., Torra, V., Navarro-Arribas, G.: Supervised Learning Using a Symmetric Bilinear Form for Record Linkage, manuscript (2014)

    Google Scholar 

  65. Nin, J., Herranz, J., Torra, V.: Rethinking rank swapping to decrease disclosure risk. Data Knowl. Eng. 64(1), 346–364 (2008)

    Article  Google Scholar 

  66. Nin, J., Herranz, J., Torra, V.: On the disclosure risk of multivariate microaggregation. Data Knowl. Eng. 67, 399–412 (2008)

    Article  Google Scholar 

  67. Nin, J., Torra, V.: Analysis of the univariate microaggregation disclosure risk. New Gener. Comput. 27, 177–194 (2009)

    Article  Google Scholar 

  68. Muntés-Mulero, V., Nin, J.: Privacy and anonymization for very large datasets. In: Proceedings 18th ACM conference on CIKM (2009)

    Google Scholar 

  69. Solé, M., Muntés-Mulero, V., Nin, J.: Efficient microaggregation techniques for large numerical data volumes. Int. J. Inf. Secur. 11(4), 253–267 (2012)

    Article  Google Scholar 

  70. Herranz, J., Nin, J., Solé, M.: Kd-trees and the real disclosure risks of large statistical databases. Inf. Fusion 13, 260–273 (2012)

    Article  Google Scholar 

  71. Juárez, M., Torra, V.: Toward a privacy agent for information retrieval. Int. J. Intel. Syst. 28(6), 606–622 (2013)

    Article  Google Scholar 

  72. Juárez, M., Torra, V.: Optimisation-Based Study of Data Privacy by Using PRAM. Chapter 21, Advanced Research on Data Privacy. Springer, Berlin (2014)

    Google Scholar 

  73. Torra, V.: Towards knowledge intensive data privacy. Data privacy management and autonomous spontaneous security. Lect. Notes Comput. Sci. 6514, 1–7 (2011)

    Google Scholar 

  74. Abril, D., Navarro-Arribas, G., Torra, V.: Towards semantic microaggregation of categorical data for confidential documents. Lect. Notes Comput. Sci. 6408, 266–276 (2010)

    Google Scholar 

  75. Martínez, S., Valls, A., Sanchez, D. Semantic anonymisation of categorical datasets. Chapter 7, Advanced Research on Data Privacy. Springer, Berlin (2014)

    Google Scholar 

Download references

Acknowledgments

The research leading to these results was mainly funded by the Spanish MEC projects ARES (CONSOLIDER INGENIO 2010 CSD2007-00004). Partial support from Spanish projects e-Aegis (TSI2007-65406-C03), COPRIVACY (TIN2011-27076-C03-03), and from the European Union’s Seventh Framework Programme (FP7/2007-2013) under grant agreement n? 262608 is also acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vicenç Torra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Torra, V., Navarro-Arribas, G. (2015). Data Privacy: A Survey of Results. In: Navarro-Arribas, G., Torra, V. (eds) Advanced Research in Data Privacy. Studies in Computational Intelligence, vol 567. Springer, Cham. https://doi.org/10.1007/978-3-319-09885-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09885-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09884-5

  • Online ISBN: 978-3-319-09885-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics