DocumentCode :
2377484
Title :
The complexity of a data privacy protection algorithm
Author :
Hsu, Shih-Ying ; Wei, Ruizhong
Author_Institution :
Dept. of Comput. Sci., Lakehead Univ., Thunder Bay, ON, Canada
fYear :
2011
fDate :
8-10 June 2011
Firstpage :
61
Lastpage :
68
Abstract :
To share data with other parties in computer collaboration is an important issue of data security. k-anonymity and ℓ-diversity are used to protect privacy and secure data sharing. It was proved that optimal k-anonymity are NP hard for k ≥ 3 and that there is a polynomial algorithm for optimal 2-anonymity. This paper proves that an optimal 2-diversity is NP hard. Since ℓ-diversity must be ℓ-anonymity, it follows that the ℓ-diversity is NP hard for ℓ ≥ 2. The result shows that finding polynomial algorithm for efficient (but not optimal) ℓ-diversity is important.
Keywords :
computational complexity; data privacy; NP hard; computer collaboration; data privacy protection algorithm complexity; data security; k-anonymity; l-diversity; polynomial algorithm; secure data sharing; Cancer; Complexity theory; Data privacy; Diseases; Heart; Joining processes; Polynomials; Data engineering; NP-hard; data security; information anonymity;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Supported Cooperative Work in Design (CSCWD), 2011 15th International Conference on
Conference_Location :
Lausanne
Print_ISBN :
978-1-4577-0386-7
Type :
conf
DOI :
10.1109/CSCWD.2011.5960056
Filename :
5960056
Link To Document :
بازگشت