Skip to main content

My Research Paper - Comparison between 2 models of K-Anonymity: Incognito and Mondrian

TOPIC

Comparison between 2 models of K-Anonymity: Incognito and Mondrian

ABSTRACT

Often organizations publish microdata for purposes such as public health and demographic research. Although attributes that could identify the individuals such as names and IDs are removed, by combining information (such as Zipcode and Birthdays) within different database, these individuals could still be identified through “Joining Attacks” – Combining 2 different database by cross-linking the similar information.

K-Anonymity has been proposed as a mechanism for protecting privacy by generalizing or suppressing certain portion of the released microdata. There had been several models of K-Anonymity since, each release attempts to improve the previous version’s weaknesses. In this paper, we will compare 2 models of K-Anonymity, namely Incognito (full-domain generalization) and Mondrian (multidimensional model), in terms of their effectiveness as well as their performance.

GENERAL TERMS

Algorithms, Experimentation, Theory

KEYWORDS

K-Anonymity, Incognito, Mondrian

REFERENCES

[1] Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan, 2005. Incognito: Efficient FullDomain KAnonymity. University of Wisconsin, Madison. http://www.cse.iitb.ac.in/dbms/Data/Courses/CS632/Papers/incognito.pdf
[2] Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan, 2006. Mondrian Multidimensional K-Anonymity. University of Wisconsin, Madison.
http://www.cse.iitb.ac.in/dbms/Data/Courses/CS632/Papers/kanon-lefevre-icde06.pdf
[3] C. Blake and C. Merz. UCI repository of machine learning databases, 1998.
[4] Wikipedia Authors, Visual Basic for Applications, Wikipedia, Retrieved on 6 April 2010.
http://en.wikipedia.org/wiki/Visual_Basic_for_Applications
[5] Wolfram Research Inc, Box-Muller Transformation, Wolfram MathWorld, Retrieved on 6 April 2010.
http://mathworld.wolfram.com/Box-MullerTransformation.html
[6] R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
[7] L. Sweeney. K-Anonimity: A model for protecting privacy, International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10(5):557-570, 2002

Popular Posts

Ho Ching named 5th most powerful and is mistaken as first lady by Forbes

Forbes named Singapore Prime Minister wife and CEO of Temasek Holdings, Ho Ching, as the 5th most powerful woman in the world. Ho Ching is mistaken as Singapore's first lady! OMG!

I wonder how can Forbes makes such a blunder. For a complete list, refer to here.

How to stop FortiClient from starting automatically?

Installed FortiClient recently but the challenge in disabling the application/service from running automatically on every start-up annoyed me. Attempt to stop 'FortiClient Service Scheduler' only return 'Parameter is incorrect' error message.

An article on Technet help solve my trouble. To stop FortiClient from starting automatically, try the following:
Shut down FortiClient from the system tray.
Run net stop fortishield on command prompt.
Run msconfig.
On msconfig, switch to the Services tab. Clear the FortiClient Service Scheduler check box and click Apply.Run services.msc on command prompt to open up show all available services.Look for FortiClient Service Scheduler. Switch Startup type to Manual.Restart your computer. FortiClient should not be running automatically the next time round. Hope it helps.
QET next week

My friend admitting to NTU this month had had their QET few days back and from them, their QET's format was straightforward and questions to me was simple. 2 close passages with some blanks for students to fill in and a 300 words essay to be written from many topics to choose from. Topics available to choose from are like "Why do you choose NTU?", "Describe one major recent event just happened in your country", "What do you want to do in the future?", etc. Very simple to write essay with 300 words limit. But then for NUS, it is a very different story. 1 close passage with many grammatical phrases underlined for you to edit and a 500 words essay to write. Before writing the essay, there will have 3 pre-reading topics for students to ponder and then a lengthy topic related article to read from. There is only ONE essay TOPIC to write on and it can be like "how your country's goverment can help reserve the originality of tourist spot…