Publication | Closed Access
On Anti-Corruption Privacy Preserving Publication
63
Citations
35
References
2008
Year
Unknown Venue
Privacy ProtectionEngineeringInformation SecurityLawInformation ForensicsPseudonymizationComputational Social ScienceData ScienceData AnonymizationData ManagementStatisticsConventional GeneralizationData PrivacyComputer SciencePrivacy AnonymityPrivacyPrivacy LeakageData SecurityCryptographyPrivacy ThreatAlternative Anonymization Technique
This paper deals with a new type of privacy threat, called "corruption" in anonymized data publication. Specifically, an adversary is said to have corrupted some individuals, if s/he has already obtained their sensitive values before consulting the released information. Conventional generalization may lead to severe privacy disclosure in the presence of corruption. Motivated by this, we advocate an alternative anonymization technique that integrates generalization with perturbation and stratified sampling. The integration provides strong privacy guarantees, even if an adversary has corrupted any number of individuals. We verify the effectiveness of the proposed technique through experiments with real data.
| Year | Citations | |
|---|---|---|
Page 1
Page 1