Title :
K-Anonymity for Crowdsourcing Database
Author :
Sai Wu ; Xiaoli Wang ; Sheng Wang ; Zhenjie Zhang ; Tung, A.K.H.
Author_Institution :
Coll. of Comput. Sci., Zhejiang Univ., Hangzhou, China
Abstract :
In crowdsourcing database, human operators are embedded into the database engine and collaborate with other conventional database operators to process the queries. Each human operator publishes small HITs (Human Intelligent Task) to the crowdsourcing platform, which consists of a set of database records and corresponding questions for human workers. The human workers complete the HITs and return the results to the crowdsourcing database for further processing. In practice, published records in HITs may contain sensitive attributes, probably causing privacy leakage so that malicious workers could link them with other public databases to reveal individual private information. Conventional privacy protection techniques, such as K-Anonymity, can be applied to partially solve the problem. However, after generalizing the data, the result of standard K-Anonymity algorithms may render uncontrollable information loss and affects the accuracy of crowdsourcing. In this paper, we first study the tradeoff between the privacy and accuracy for the human operator within data anonymization process. A probability model is proposed to estimate the lower bound and upper bound of the accuracy for general K-Anonymity approaches. We show that searching the optimal anonymity approach is NP-Hard and only heuristic approach is available. The second contribution of the paper is a general feedback-based K-Anonymity scheme. In our scheme, synthetic samples are published to the human workers, the results of which are used to guide the selection on anonymity strategies. We apply the scheme on Mondrian algorithm by adaptively cutting the dimensions based on our feedback results on the synthetic samples. We evaluate the performance of the feedback-based approach on U.S. census dataset, and show that given a predefined K, our proposal outperforms standard K-Anonymity approaches on retaining the effectiveness of crowdsourcing.
Keywords :
computational complexity; data privacy; database management systems; query processing; HIT; Mondrian algorithm; NP-hard; US census dataset; crowdsourcing database; crowdsourcing platform; data anonymization process; database engine; database operators; general feedback-based k-anonymity scheme; human intelligent task; human operators; human workers; k-anonymity; malicious workers; privacy protection techniques; public databases; published records; query processing; uncontrollable information loss; Accuracy; Crowdsourcing; Data privacy; Databases; Engines; Privacy; Upper bound; Crowdsourcing; Database Management; General; Information Technology and Systems; K-Anonymity; Query design and implementation languages; Security; and protection; data partition; database privacy; integrity;
Journal_Title :
Knowledge and Data Engineering, IEEE Transactions on
DOI :
10.1109/TKDE.2013.93