Title :
The complexity of a data privacy protection algorithm
Author :
Hsu, Shih-Ying ; Wei, Ruizhong
Author_Institution :
Dept. of Comput. Sci., Lakehead Univ., Thunder Bay, ON, Canada
Abstract :
To share data with other parties in computer collaboration is an important issue of data security. k-anonymity and ℓ-diversity are used to protect privacy and secure data sharing. It was proved that optimal k-anonymity are NP hard for k ≥ 3 and that there is a polynomial algorithm for optimal 2-anonymity. This paper proves that an optimal 2-diversity is NP hard. Since ℓ-diversity must be ℓ-anonymity, it follows that the ℓ-diversity is NP hard for ℓ ≥ 2. The result shows that finding polynomial algorithm for efficient (but not optimal) ℓ-diversity is important.
Keywords :
computational complexity; data privacy; NP hard; computer collaboration; data privacy protection algorithm complexity; data security; k-anonymity; l-diversity; polynomial algorithm; secure data sharing; Cancer; Complexity theory; Data privacy; Diseases; Heart; Joining processes; Polynomials; Data engineering; NP-hard; data security; information anonymity;
Conference_Titel :
Computer Supported Cooperative Work in Design (CSCWD), 2011 15th International Conference on
Conference_Location :
Lausanne
Print_ISBN :
978-1-4577-0386-7
DOI :
10.1109/CSCWD.2011.5960056