Sharing microdata tables is a primary concern in today information society. Privacy issues can be an obstacle to the free flow of such information. In recent years, disclosure control techniques have been developed to modify microdata tables in order to be anonymous. The k-anonymity framework has been widely adopted as a standard technique to remove links between public available identifiers (such as full names) and sensitive data contained in the shared tables. In this paper we give a weaker definition of k-anonymity, allowing lower distortion on the anonymized data. We show that, under the hypothesis in which the adversary is not sure a priori about the presence of a person in the table, the privacy properties of k-anonymity are respected also in the weak k-anonymity framework. Experiments on real-world data show that our approach outperforms k-anonymity in terms of distortion introduced in the released data by the algorithms to enforce anonymity.

Weak k-anonymity: a low-distortion model for protecting privacy

Atzori M
2006

Abstract

Sharing microdata tables is a primary concern in today information society. Privacy issues can be an obstacle to the free flow of such information. In recent years, disclosure control techniques have been developed to modify microdata tables in order to be anonymous. The k-anonymity framework has been widely adopted as a standard technique to remove links between public available identifiers (such as full names) and sensitive data contained in the shared tables. In this paper we give a weaker definition of k-anonymity, allowing lower distortion on the anonymized data. We show that, under the hypothesis in which the adversary is not sure a priori about the presence of a person in the table, the privacy properties of k-anonymity are respected also in the weak k-anonymity framework. Experiments on real-world data show that our approach outperforms k-anonymity in terms of distortion introduced in the released data by the algorithms to enforce anonymity.
2006
Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo" - ISTI
H.2.8 Database Applications. Statistical databases
Privacy
File in questo prodotto:
File Dimensione Formato  
prod_43908-doc_129512.pdf

solo utenti autorizzati

Descrizione: Weak k-anonymity: a low-distortion model for protecting privacy
Tipologia: Versione Editoriale (PDF)
Dimensione 619.14 kB
Formato Adobe PDF
619.14 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/43510
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact