Abstract | ||
---|---|---|
Advances in information technology, and its use in research, are increasing both the need for anonymized data and the risks of poor anonymization. We present a metric, δ-presence, that clearly links the quality of anonymization to the risk posed by inadequate anonymization. We show that existing anonymization techniques are inappropriate for situations where δ-presence is a good metric (specifically, where knowing an individual is in the database poses a privacy risk), and present algorithms for effectively anonymizing to meet δ-presence. The algorithms are evaluated in the context of a real-world scenario, demonstrating practical applicability of the approach. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1145/1247480.1247554 | SIGMOD Conference |
Keywords | Field | DocType |
information technology,poor anonymization,shared databases,anonymized data,inadequate anonymization,real-world scenario,present algorithm,practical applicability,anonymization technique,privacy risk,privacy | Data mining,Information technology,Computer security,Computer science,k-anonymity,Database | Conference |
Citations | PageRank | References |
95 | 3.41 | 14 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mehmet Ercan Nergiz | 1 | 291 | 15.64 |
Atzori, Maurizio | 2 | 285 | 25.73 |
Chris Clifton | 3 | 3327 | 544.44 |