메뉴 건너뛰기




Volumn , Issue , 2008, Pages 70-78

The cost of privacy: Destruction of data-mining utility in anonymized data publishing

Author keywords

Anonymity; Data mining; Privacy; Utility

Indexed keywords

ANONYMITY; DATA PUBLISHING; DATA-MINING ALGORITHMS; DATA-SETS; EXPERIMENTAL EVALUATIONS; K ANONYMITIES; K-ANONYMIZATION; PRIVACY; PRIVACY PROTECTIONS; SANITIZATION; SENSITIVE ATTRIBUTES; UCI MACHINE LEARNING REPOSITORIES; UTILITY; ZIP CODES;

EID: 65449147584     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1401890.1401904     Document Type: Conference Paper
Times cited : (269)

References (43)
  • 2
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. Adam and J. Worthmann. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4), 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4
    • Adam, N.1    Worthmann, J.2
  • 3
    • 33745629638 scopus 로고    scopus 로고
    • On k-anonymity and the curse of dimensionality
    • C. Aggarwal. On k-anonymity and the curse of dimensionality. In VLDB, 2005.
    • (2005) VLDB
    • Aggarwal, C.1
  • 4
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD, 2000.
    • (2000) SIGMOD
    • Agrawal, R.1    Srikant, R.2
  • 5
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
    • (2005) ICDE
    • Bayardo, R.1    Agrawal, R.2
  • 7
    • 65449181024 scopus 로고    scopus 로고
    • J.-W. Byun, Y. Sohn, E. Bertino, and N. Li. Secure anonymization for incremental datasets. In SDM, 2006.
    • J.-W. Byun, Y. Sohn, E. Bertino, and N. Li. Secure anonymization for incremental datasets. In SDM, 2006.
  • 8
    • 65449183035 scopus 로고    scopus 로고
    • S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Towards privacy in public databases. In TCC, 2005.
    • S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Towards privacy in public databases. In TCC, 2005.
  • 9
    • 85011039411 scopus 로고    scopus 로고
    • Privacy skyline: Privacy with multidimensional adversarial knowledge
    • B.-C. Chen, K. LeFevre, and R. Ramakrishnan. Privacy skyline: privacy with multidimensional adversarial knowledge. In VLDB, 2007.
    • (2007) VLDB
    • Chen, B.-C.1    LeFevre, K.2    Ramakrishnan, R.3
  • 11
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, 2003.
    • (2003) PODS
    • Dinur, I.1    Nissim, K.2
  • 12
    • 50249086141 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork. Differential privacy. In ICALP, 2006.
    • (2006) ICALP
    • Dwork, C.1
  • 13
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy-preserving data mining
    • A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy-preserving data mining. In PODS, 2003.
    • (2003) PODS
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 14
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • B. Fung, K. Wang, and P. Yu. Top-down specialization for information and privacy preservation. In ICDE, 2005.
    • (2005) ICDE
    • Fung, B.1    Wang, K.2    Yu, P.3
  • 15
    • 0242625276 scopus 로고    scopus 로고
    • V. Iyengar. Transforming data to satisfy privacy constraints. In KDD, 2002.
    • V. Iyengar. Transforming data to satisfy privacy constraints. In KDD, 2002.
  • 16
    • 34250673244 scopus 로고    scopus 로고
    • Injecting utility into anonymized datasets
    • D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In SIGMOD, 2006.
    • (2006) SIGMOD
    • Kifer, D.1    Gehrke, J.2
  • 17
    • 0000964471 scopus 로고
    • Measures of disclosure risk and harm
    • D. Lambert. Measures of disclosure risk and harm. J. Official Stat, 9, 1993.
    • (1993) J. Official Stat , vol.9
    • Lambert, D.1
  • 18
  • 20
    • 33749568323 scopus 로고    scopus 로고
    • K. LeFevre, D. DeWitt, and R. Ramakrishnan. Workload-aware anonymization. In KDD, 2006.
    • K. LeFevre, D. DeWitt, and R. Ramakrishnan. Workload-aware anonymization. In KDD, 2006.
  • 21
    • 34548805858 scopus 로고    scopus 로고
    • t-closeness: Privacy beyond k-anonymity and ℓ-diversity
    • N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and ℓ-diversity. In ICDE, 2007.
    • (2007) ICDE
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 22
    • 65449120240 scopus 로고    scopus 로고
    • A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond fc-anonymity. In ICDE, 2006.
    • A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond fc-anonymity. In ICDE, 2006.
  • 24
    • 3142686877 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, 2004.
    • (2004) SIGMOD
    • Miklau, G.1    Suciu, D.2
  • 25
    • 77951170902 scopus 로고    scopus 로고
    • Thoughts on k-anonymization
    • M. Nergiz and C. Clifton. Thoughts on k-anonymization. In PDM, 2006.
    • (2006) In PDM
    • Nergiz, M.1    Clifton, C.2
  • 26
    • 35448937300 scopus 로고    scopus 로고
    • Hiding the presence of individuals from shared database
    • M. Nergiz, M. Atzori, and C. Clifton. Hiding the presence of individuals from shared database. In SIGMOD, 2007.
    • (2007) SIGMOD
    • Nergiz, M.1    Atzori, M.2    Clifton, C.3
  • 29
    • 35448962139 scopus 로고    scopus 로고
    • Approximate algorithms for k-anonymity
    • H. Park and K. Shim. Approximate algorithms for k-anonymity. In SIGMOD, 2007.
    • (2007) SIGMOD
    • Park, H.1    Shim, K.2
  • 30
    • 85011019712 scopus 로고    scopus 로고
    • The boundary between privacy and utility in data publishing
    • V. Rastogi, D. Suciu, and S. Hong. The boundary between privacy and utility in data publishing. In VLDB, 2007.
    • (2007) VLDB
    • Rastogi, V.1    Suciu, D.2    Hong, S.3
  • 32
    • 0031150446 scopus 로고    scopus 로고
    • Weaving technology and policy together to maintain confidentiality
    • L. Sweeney. Weaving technology and policy together to maintain confidentiality. J. of Law, Medicine and Ethics, 25(2-3):98-110, 1997.
    • (1997) J. of Law, Medicine and Ethics , vol.25 , Issue.2-3 , pp. 98-110
    • Sweeney, L.1
  • 33
    • 85150404048 scopus 로고    scopus 로고
    • L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):571-588, 2002.
    • L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):571-588, 2002.
  • 34
    • 0036811662 scopus 로고    scopus 로고
    • L. Sweeney, k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):557-570, 2002.
    • L. Sweeney, k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):557-570, 2002.
  • 36
    • 65449172297 scopus 로고    scopus 로고
    • T. Truta and B. Vinay. Privacy protection: p-sensitive k-anonymity property. In PDM, 2006.
    • T. Truta and B. Vinay. Privacy protection: p-sensitive k-anonymity property. In PDM, 2006.
  • 37
    • 33749581232 scopus 로고    scopus 로고
    • K. Wang and B. Fung. Anonymizing sequential releases. In KDD, 2006.
    • K. Wang and B. Fung. Anonymizing sequential releases. In KDD, 2006.
  • 38
    • 33749568934 scopus 로고    scopus 로고
    • Template-based privacy preservation in classification problems
    • K. Wang, B. Fung, and P. Yu. Template-based privacy preservation in classification problems. In ICDM, 2005.
    • (2005) ICDM
    • Wang, K.1    Fung, B.2    Yu, P.3
  • 39
    • 84868919040 scopus 로고    scopus 로고
    • R. Wong, J. Ii, A. Fu, and K. Wang. (α,k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In KDD, 2006.
    • R. Wong, J. Ii, A. Fu, and K. Wang. (α,k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In KDD, 2006.
  • 40
    • 35448967088 scopus 로고    scopus 로고
    • m-invariance: Towards privacy preserving re-publication of dynamic datasets
    • X. Xiao and T. Tao. m-invariance: Towards privacy preserving re-publication of dynamic datasets. In SIGMOD, 2007.
    • (2007) SIGMOD
    • Xiao, X.1    Tao, T.2
  • 41
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: Simple and effective privacy preservation
    • X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In VLDB, 2006.
    • (2006) VLDB
    • Xiao, X.1    Tao, Y.2
  • 42
    • 34250680246 scopus 로고    scopus 로고
    • Personalized privacy protection
    • X. Xiao and Y. Tao. Personalized privacy protection. In SIGMOD, 2006.
    • (2006) SIGMOD
    • Xiao, X.1    Tao, Y.2
  • 43
    • 66249085387 scopus 로고    scopus 로고
    • L. Zhang, S. Jajodia, and A. Brodsky. Information disclosure under realistic assumptions: Privacy versus optimality. In CCS, 2007.
    • L. Zhang, S. Jajodia, and A. Brodsky. Information disclosure under realistic assumptions: Privacy versus optimality. In CCS, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.