Abstract
Data sharing is a valuable tool for improving security. It allows integrating information from multiple sources to better identify and respond to global security threats. On the other side, sharing of data is limited by privacy and confidentiality. A possible solution is removing or obfuscating part of the data before release (anonymization), and, to this scope, various masking algorithms have been proposed. However, finding the right balance between privacy and the quality of data is often difficult, and it needs a fine calibration of the anonymization process. It includes choosing the ’best’ set of masking algorithms and an estimation of the risk in releasing the data. Both these processes are rather complex, especially for non-expert users. In this paper, we illustrate the typical issues in the anonymization process, and introduce a tool for assisting the user in the choice of the set of masking transformations. We also propose a caching system to speed up this process over multiple runs on similar datasets. Although, the current version has limited functionalities, and more extensive testing is needed, it is a first step in the direction of developing a user-friendly support tool for anonymization.
Chapter PDF
References
Benedetti, R., Franconi, L.: Statistical and technological solutions for controlled data dissemination. Pre-proceedings of New Techniques and Technologies for Statistics 1, 225–232 (1998)
Bezzi, M.: An entropy-based method for measuring anonymity. In: Proceedings of the IEEE/CreateNet SECOVAL Workshop on the Value of Security through Collaboration, Nice, France (September 2007)
Duncan, G., Lambert, D.: The risk of disclosure for microdata. Journal of Business & Economic Statistics 7, 207 (xx 1989), doi:10.2307/1391438, http://dx.doi.org/10.2307/1391438
Duncan, G., Keller-McNulty, S., Stokes, S.: Disclosure risk versus data utility: The RU confidentiality map. Technical paper, Los Alamos National Laboratory, Los Alamos, NM (2001)
Kounine, A., Bezzi, M.: Assessing disclosure risk in anonymized datasets. In: Proceedings of the FloCon Workshop (January 2009)
Narayanan, A., Shmatikov, V.: How to break anonymity of the netflix prize dataset (October 2006), http://arxiv.org/abs/cs/0610105
Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. on Knowl. and Data Eng. 13(6), 1010–1027 (2001)
Skinner, C.J., Elliot, M.J.: A measure of disclosure risk for microdata. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 64(4), 855–867 (2002), http://www.blackwell-synergy.com/doi/abs/10.1111/1467-9868.00365
Slagell, A., Yurcik, W.: Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization (2005), citeseer.ist.psu.edu/slagell05sharing.html
Slagell, A.J., Lakkaraju, K., Luo, K.: Flaim: A multi-level anonymization framework for computer and network logs. In: LISA, USENIX, pp. 63–77 (2006)
Trabelsi, S., Salzgeber, V., Bezzi, M., Montagnon, G.: Data disclosure risk evaluation. In: 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS), October 2009, pp. 35–72 (2009)
Truta, T.M., Fotouhi, F., Barth-Jones, D.: Assessing global disclosure risk in masked microdata. In: WPES 2004: Proceedings of the 2004 ACM workshop on Privacy in the electronic society, pp. 85–93. ACM Press, New York (2004)
Tsui, F.C., Espino, J.U., Dato, V.M., Gesteland, P.H., Hutman, J., Wagner, M.M.: Technical Description of RODS: A Real-time Public Health Surveillance System. J. Am. Med. Inform. Assoc. 10(5), 399–408 (2003), http://www.jamia.org/cgi/content/abstract/10/5/399
Yancey, W.E., Winkler, W.E., Creecy, R.H.: Disclosure risk assessment in perturbative microdata protection. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol. 2316, pp. 135–152. Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Bezzi, M., Montagnon, G., Salzgeber, V., Trabelsi, S. (2010). Sharing Data for Public Security. In: Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds) Privacy and Identity Management for Life. Privacy and Identity 2009. IFIP Advances in Information and Communication Technology, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14282-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-14282-6_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14281-9
Online ISBN: 978-3-642-14282-6
eBook Packages: Computer ScienceComputer Science (R0)