TOPIC
Comparison between 2 models of K-Anonymity: Incognito and Mondrian
ABSTRACT
Often organizations publish microdata for purposes such as public health and demographic research. Although attributes that could identify the individuals such as names and IDs are removed, by combining information (such as Zipcode and Birthdays) within different database, these individuals could still be identified through “Joining Attacks” – Combining 2 different database by cross-linking the similar information.
K-Anonymity has been proposed as a mechanism for protecting privacy by generalizing or suppressing certain portion of the released microdata. There had been several models of K-Anonymity since, each release attempts to improve the previous version’s weaknesses. In this paper, we will compare 2 models of K-Anonymity, namely Incognito (full-domain generalization) and Mondrian (multidimensional model), in terms of their effectiveness as well as their performance.
GENERAL TERMS
Algorithms, Experimentation, Theory
KEYWORDS
K-Anonymity, Incognito, Mondrian
REFERENCES
[1] Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan, 2005. Incognito: Efficient FullDomain KAnonymity. University of Wisconsin, Madison. http://www.cse.iitb.ac.in/dbms/Data/Courses/CS632/Papers/incognito.pdf
[2] Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan, 2006. Mondrian Multidimensional K-Anonymity. University of Wisconsin, Madison.
http://www.cse.iitb.ac.in/dbms/Data/Courses/CS632/Papers/kanon-lefevre-icde06.pdf
[3] C. Blake and C. Merz. UCI repository of machine learning databases, 1998.
[4] Wikipedia Authors, Visual Basic for Applications, Wikipedia, Retrieved on 6 April 2010.
http://en.wikipedia.org/wiki/Visual_Basic_for_Applications
[5] Wolfram Research Inc, Box-Muller Transformation, Wolfram MathWorld, Retrieved on 6 April 2010.
http://mathworld.wolfram.com/Box-MullerTransformation.html
[6] R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
[7] L. Sweeney. K-Anonimity: A model for protecting privacy, International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10(5):557-570, 2002
Computer, Technology, Databases, Google, Internet, Mobile, Linux, Microsoft, Open Source, Security, Social Media, Web Development, Business, Finance
Subscribe to:
Post Comments (Atom)
Popular Posts
-
新加坡人口400万,亚洲人口4亿,全世界人口6亿。 但是,我一人可能就很有可能是世界最傻的了。我真是个不折不扣的大木头。真是受不了自己。
-
I recently wrote a code snippet to fill arrays with a value. The below method is a generic method that will accept different data types. Hop...
-
If you are working with PowerShell and need a fast way to list all files in a directory, including those buried in subfolders, this one-line...
-
*********** Try to sleep now, close your eyes Soon the birds would stop singing Twinkling stars, are shining bright They'll be watch...
-
Installed FortiClient recently but the challenge in disabling the application/service from running automatically on every start-up annoyed m...
No comments:
Post a Comment
Do provide your constructive comment. I appreciate that.