Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2008) On the complexity of restricted k-anonymity problem. In: APWeb 2008: 10th Asia-Pacific Web Conference, 26-28 Apr 2008, Shenyang, China.
|HTML Citation||EndNote||Dublin Core||Reference Manager|
Full text available as:
|PDF (Accepted version) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader|
|PDF (Documentation) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader|
Identification Number or DOI: doi: 10.1007/978-3-540-78849-2_30
One of the emerging concepts in microdata protection is k-anonymity, introduced by Samarati and Sweeney. k-anonymity provides a simple and efficient approach to protect private individual information and is gaining increasing popularity. k-anonymity requires that every tuple(record) in the microdata table released be indistinguishably related to no fewer than k respondents. In this paper, we introduce two new variants of the k-anonymity problem, namely, the Restricted k-anonymity problem and Restricted k-anonymity problem on attribute (where suppressing the entire attribute is allowed). We prove that both problems are NP-hard for k ≥ 3. The results imply the main results obtained by Meyerson and Williams. On the positive side, we develop a polynomial time algorithm for the Restricted 2-anonymity problem by giving a graphical representation of the microdata table.
Archive Staff Only: edit this record