Extended K-anonymity models against attribute disclosure

Sun, Xiaoxun and Wang, Hua and Sun, Lili (2009) Extended K-anonymity models against attribute disclosure. In: NSS 2009: 3rd International Conference on Network and System Security, 19-21 Oct 2009, Gold Coast, Australia.


Abstract

P-sensitive K-anonymity model has been recently defined as a sophistication of K-anonymity. This new property requires that there be at least P distinct values for each sensitive attribute within the records sharing a combination of key attributes. However, as shown in this paper, it may not protect sensitive information in some way. In this paper, we empirically investigate two enhanced K-anonymity models. Instead of publishing original specific sensitive attributes, the new models publish the categories that the sensitive values belong to. We propose a top-down approach to implement two enhanced models and show in the comprehensive experimental evaluations that the two new introduced models are practical in terms of effectiveness and efficiency.


Statistics for USQ ePrint 6321
Statistics for this ePrint Item
Item Type: Conference or Workshop Item (Commonwealth Reporting Category E) (Paper)
Refereed: Yes
Item Status: Live Archive
Additional Information: © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Faculty/School / Institute/Centre: Historic - Faculty of Sciences - Department of Maths and Computing (Up to 30 Jun 2013)
Faculty/School / Institute/Centre: Historic - Faculty of Sciences - Department of Maths and Computing (Up to 30 Jun 2013)
Date Deposited: 10 Aug 2010 12:15
Last Modified: 02 Jul 2013 23:32
Uncontrolled Keywords: attribute disclosure; extended k-anonymity models; p-sensitive k-anonymity model; sensitive information; specific sensitive attributes; top-down approach
Fields of Research (2008): 08 Information and Computing Sciences > 0806 Information Systems > 080604 Database Management
08 Information and Computing Sciences > 0802 Computation Theory and Mathematics > 080201 Analysis of Algorithms and Complexity
08 Information and Computing Sciences > 0803 Computer Software > 080303 Computer System Security
Fields of Research (2020): 46 INFORMATION AND COMPUTING SCIENCES > 4605 Data management and data science > 460599 Data management and data science not elsewhere classified
46 INFORMATION AND COMPUTING SCIENCES > 4613 Theory of computation > 461399 Theory of computation not elsewhere classified
46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460499 Cybersecurity and privacy not elsewhere classified
Socio-Economic Objectives (2008): E Expanding Knowledge > 97 Expanding Knowledge > 970108 Expanding Knowledge in the Information and Computing Sciences
Identification Number or DOI: https://doi.org/10.1109/NSS.2009.23
URI: http://eprints.usq.edu.au/id/eprint/6321

Actions (login required)

View Item Archive Repository Staff Only