• DocumentCode
    3107147
  • Title

    Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks

  • Author

    Teng, Zhouxuan ; Du, Wenliang

  • Author_Institution
    Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY
  • fYear
    2006
  • fDate
    18-22 Dec. 2006
  • Firstpage
    1091
  • Lastpage
    1096
  • Abstract
    Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attributes. If attacks succeed, the identity of the record will be revealed and potential confidential information contained in other attributes of the record will be disclosed. K-anonymity counters this attack by requiring that each record must be indistinguishable from at least K-1 other records with respect to the identifying attributes. Randomization can also be used for protection against linking attacks. In this paper, we compare the performance of K-anonymization and randomization schemes under linking attacks. We present a new privacy definition that can be applied to both k-anonymization and randomization. We compare these two schemes in terms of both utility and risks of privacy disclosure, and we promote to use R-U confidentiality map for such comparisons. We also compare various randomization schemes.
  • Keywords
    data privacy; random processes; K-anonymity; K-anonymization schemes; R-U confidentiality map; linking attacks; privacy disclosure; privacy quantification; randomization schemes; Aggregates; Association rules; Counting circuits; Data mining; Data privacy; Databases; Decision trees; Information technology; Joining processes; Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Data Mining, 2006. ICDM '06. Sixth International Conference on
  • Conference_Location
    Hong Kong
  • ISSN
    1550-4786
  • Print_ISBN
    0-7695-2701-7
  • Type

    conf

  • DOI
    10.1109/ICDM.2006.40
  • Filename
    4053159