메뉴 건너뛰기




Volumn 20, Issue 4, 2011, Pages 567-588

Anonymity meets game theory: Secure data integration with malicious participants

Author keywords

Classification; k anonymity; Privacy; Secure data integration

Indexed keywords

CUSTOMIZABLE; DATA INTEGRATION; DATA SHARING; FINANCIAL INDUSTRY; K-ANONYMITY; LARGE DATASETS; MALICIOUS PARTICIPANT; MULTIPLE DATA; PRIVACY MODELS; PRIVACY PROBLEMS; PRIVATE DATA; REAL LIFE DATA; SECURE DATA; SEMI-HONEST ADVERSARIES; SENSITIVE INFORMATIONS; VERY LARGE DATUM;

EID: 79960442271     PISSN: 10668888     EISSN: 0949877X     Source Type: Journal    
DOI: 10.1007/s00778-010-0214-6     Document Type: Article
Times cited : (57)

References (61)
  • 1
    • 0024914229 scopus 로고
    • Security control methods for statistical databases
    • Adam N. R., Wortman J. C.: Security control methods for statistical databases. ACM Comput. Surv. 21(4), 515-556 (1989).
    • (1989) ACM Comput. Surv. , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortman, J.C.2
  • 5
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • Bayardo, R. J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE (2005).
    • (2005) ICDE
    • Bayardo, R.J.1    Agrawal, R.2
  • 7
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • Brodsky A., Farkas C., Jajodia S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12, 900-919 (2000).
    • (2000) IEEE Trans. Knowl. Data Eng. , vol.12 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 9
    • 0021519434 scopus 로고
    • View definition and generalization for database integration in a multidatabase systems
    • Dayal U., Hwang H. Y.: View definition and generalization for database integration in a multidatabase systems. IEEE Trans. Softw. Eng. 10(6), 628-645 (1984).
    • (1984) IEEE Trans. Softw. Eng. , vol.10 , Issue.6 , pp. 628-645
    • Dayal, U.1    Hwang, H.Y.2
  • 10
    • 0020779363 scopus 로고
    • Inference controls for statistical databases
    • Denning D., Schlorer J.: Inference controls for statistical databases. IEEE Comput. 16(7), 69-82 (1983).
    • (1983) IEEE Comput. , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.1    Schlorer, J.2
  • 11
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: PODS (2003).
    • (2003) PODS
    • Dinur, I.1    Nissim, K.2
  • 14
    • 50249086141 scopus 로고    scopus 로고
    • Differential privacy
    • Dwork, C.: Differential privacy. In: ICALP (2006).
    • (2006) ICALP
    • Dwork, C.1
  • 15
    • 33746086554 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: TCC (2006).
    • (2006) TCC
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 17
    • 34047165799 scopus 로고    scopus 로고
    • Anonymizing classification data for privacy preservation
    • Fung B. C. M., Wang K., Yu P. S.: Anonymizing classification data for privacy preservation. IEEE TKDE 19(5), 711-725 (2007).
    • (2007) IEEE TKDE , vol.19 , Issue.5 , pp. 711-725
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 18
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • Fung B. C. M., Wang K., Chen R., Yu P. S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42(4), 14: 1-14: 53 (2010).
    • (2010) ACM Comput. Surv. , vol.42 , Issue.4 , pp. 1-53
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 19
    • 0023861339 scopus 로고
    • Inference aggregation detection in database management systems
    • Hinke, T.: Inference aggregation detection in database management systems. In: IEEE S& P (1988).
    • (1988) IEEE S& P
    • Hinke, T.1
  • 22
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • Iyengar, V. S.: Transforming data to satisfy privacy constraints. In: SIGKDD (2002).
    • (2002) SIGKDD
    • Iyengar, V.S.1
  • 23
    • 70849119921 scopus 로고    scopus 로고
    • Privacy-preserving distributed k-anonymity
    • Jiang, W., Clifton, C.: Privacy-preserving distributed k-anonymity. In: BDSec (2005).
    • (2005) BDSec
    • Jiang, W.1    Clifton, C.2
  • 24
    • 36048997303 scopus 로고    scopus 로고
    • A secure distributed framework for achieving k-anonymity
    • Jiang W., Clifton C.: A secure distributed framework for achieving k-anonymity. Very Large Data Bases J. (VLDBJ) 15(4), 316-333 (2006).
    • (2006) Very Large Data Bases J. (VLDBJ) , vol.15 , Issue.4 , pp. 316-333
    • Jiang, W.1    Clifton, C.2
  • 25
    • 39749130001 scopus 로고    scopus 로고
    • Transforming semi-honest protocols to ensure accountability
    • Jiang W., Clifton C., Kantarcioglu M.: Transforming semi-honest protocols to ensure accountability. Data Knowl. Eng. 65(1), 57-74 (2008).
    • (2008) Data Knowl. Eng. , vol.65 , Issue.1 , pp. 57-74
    • Jiang, W.1    Clifton, C.2    Kantarcioglu, M.3
  • 26
    • 84864187257 scopus 로고    scopus 로고
    • Distributed anonymization: achieving privacy for both data subjects and data providers
    • Jurczyk, P., Xiong, L.: Distributed anonymization: achieving privacy for both data subjects and data providers. In: DBSec (2009).
    • (2009) DBSec
    • Jurczyk, P.1    Xiong, L.2
  • 27
    • 85086419359 scopus 로고    scopus 로고
    • Privacy-preserving data mining in the malicious model
    • Kantarcioglu M., Kardes O.: Privacy-preserving data mining in the malicious model. Int. J. Inf. Comput. Secur. 2(4), 353-375 (2008).
    • (2008) Int. J. Inf. Comput. Secur. , vol.2 , Issue.4 , pp. 353-375
    • Kantarcioglu, M.1    Kardes, O.2
  • 30
    • 79960446801 scopus 로고    scopus 로고
    • A game theoretic approach toward multi-party privacy-preserving distributed data mining
    • Kargupta, H., Das, K., Liu, K.: A game theoretic approach toward multi-party privacy-preserving distributed data mining. In: Proceedings of the PKDD (2007).
    • (2007) Proceedings of the PKDD
    • Kargupta, H.1    Das, K.2    Liu, K.3
  • 34
    • 34548805858 scopus 로고    scopus 로고
    • t-closeness: privacy beyond k-anonymity and ℓ-diversity
    • Li, N., Li, T., Venkatasubramanian, S. t-closeness: privacy beyond k-anonymity and ℓ-diversity. In: ICDE (2007).
    • (2007) ICDE
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 35
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell Y., Pinkas B.: Privacy preserving data mining. J. Cryptol. 15(3), 177-206 (2002).
    • (2002) J. Cryptol. , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 38
    • 70350686724 scopus 로고    scopus 로고
    • Anonymizing healthcare data: a case study on the blood transfusion service
    • Mohammed, N., Fung, B. C. M., Hung, P. C. K., Lee, C.: Anonymizing healthcare data: a case study on the blood transfusion service. In: SIGKDD (2009a).
    • (2009) SIGKDD
    • Mohammed, N.1    Fung, B.C.M.2    Hung, P.C.K.3    Lee, C.4
  • 40
    • 78149335185 scopus 로고    scopus 로고
    • Centralized and distributed anonymization for high-dimensional healthcare data
    • 33
    • Mohammed, N., Fung, B. C. M., Hung, P. C. K., Lee, C. (2010) Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans. Knowl. Discov. Data (TKDD) 4(4), 18: 1-18: 33.
    • (2010) ACM Trans. Knowl. Discov. Data (TKDD) , vol.4-18 , Issue.4 , pp. 1-18
    • Mohammed, N.1    Fung, B.C.M.2    Hung, P.C.K.3    Lee, C.4
  • 41
    • 0001730497 scopus 로고
    • Non-cooperative games
    • Nash J.: Non-cooperative games. Ann. Math. 54(2), 286-295 (1951).
    • (1951) Ann. Math. , vol.54 , Issue.2 , pp. 286-295
    • Nash, J.1
  • 45
    • 4544312695 scopus 로고    scopus 로고
    • Cryptographic techniques for privacy-preserving data mining
    • Pinkas B.: Cryptographic techniques for privacy-preserving data mining. ACM SIGKDD Explor. Newsl. 4(2), 12-19 (2002).
    • (2002) ACM SIGKDD Explor. Newsl. , vol.4 , Issue.2 , pp. 12-19
    • Pinkas, B.1
  • 47
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Samarati, P.: Protecting respondents' identities in microdata release. IEEE TKDE 13(6), 1010-1027 (2001).
    • (2001) IEEE TKDE , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 48
    • 0242698173 scopus 로고    scopus 로고
    • Datafly: a system for providing anonymity in medical data
    • Sweeney, L.: Datafly: a system for providing anonymity in medical data. In: Proceedings of the DBSec (1998).
    • (1998) Proceedings of the DBSec
    • Sweeney, L.1
  • 49
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Sweeney L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 571-588 (2002a).
    • (2002) Int. J. Uncertain. Fuzziness Knowl. Based Syst. , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 51
    • 0038896772 scopus 로고
    • Security checking in relational database management systems augmented with inference engines
    • Thuraisingham, B. M.: Security checking in relational database management systems augmented with inference engines. Comput. Secur. 6(6), 479-492 (1987).
    • (1987) Comput. Secur. , vol.6 , Issue.6 , pp. 479-492
    • Thuraisingham, B.M.1
  • 52
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitioned data
    • Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the ACM SIGKDD (2002).
    • (2002) Proceedings of the ACM SIGKDD
    • Vaidya, J.1    Clifton, C.2
  • 53
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-preserving k-means clustering over vertically partitioned data
    • Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the ACM SIGKDD (2003).
    • (2003) Proceedings of the ACM SIGKDD
    • Vaidya, J.1    Clifton, C.2
  • 54
    • 34147125465 scopus 로고    scopus 로고
    • Handicapping attacker's confidence: An alternative to k-anonymization
    • Wang K., Fung B. C. M., Yu P. S.: Handicapping attacker's confidence: An alternative to k-anonymization. KAIS 11(3), 345-368 (2007).
    • (2007) Kais , vol.11 , Issue.3 , pp. 345-368
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3
  • 55
    • 0027621739 scopus 로고
    • Intelligent integration of information
    • Wiederhold, G.: Intelligent integration of information. In: Proceedings of ACM SIGMOD, pp 434-437 (1993).
    • (1993) Proceedings of ACM SIGMOD , pp. 434-437
    • Wiederhold, G.1
  • 56
    • 33749571958 scopus 로고    scopus 로고
    • (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
    • Wong, R. C. W., Li, J., Fu, A. W. C., Wang, K.: (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: SIGKDD (2006).
    • (2006) SIGKDD
    • Wong, R.C.W.1    Li, J.2    Fu, A.W.C.3    Wang, K.4
  • 57
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: simple and effective privacy preservation
    • Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: VLDB (2006).
    • (2006) VLDB
    • Xiao, X.1    Tao, Y.2
  • 58
    • 77952257230 scopus 로고    scopus 로고
    • The hardness and approximation algorithms for l-diversity
    • Xiao, X., Yi, K., Tao, Y. The hardness and approximation algorithms for l-diversity. In: EDBT (2010).
    • (2010) EDBT
    • Xiao, X.1    Yi, K.2    Tao, Y.3
  • 59
    • 84880121624 scopus 로고    scopus 로고
    • Privacy-preserving classification of customer data without loss of accuracy
    • Yang, Z., Zhong, S., Wright, R. N.: Privacy-preserving classification of customer data without loss of accuracy. In: Proceedings of the SDM (2005).
    • (2005) Proceedings of the SDM
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3
  • 61
    • 33745599368 scopus 로고    scopus 로고
    • Distributed privacy preserving information sharing
    • Zhang, N., Zhao, W.: Distributed privacy preserving information sharing. In: Proceedings of the VLDB (2005).
    • (2005) Proceedings of the VLDB
    • Zhang, N.1    Zhao, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.