Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Top-Down Specialization for Information and Privacy Preservation
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Injecting utility into anonymized datasets
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Anonymizing sequential releases
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
(α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Utility-based anonymization using local recoding
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Handicapping attacker's confidence: an alternative to k-anonymization
Knowledge and Information Systems
M-invariance: towards privacy preserving re-publication of dynamic datasets
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Remote timing attacks are practical
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
ICDT'05 Proceedings of the 10th international conference on Database Theory
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
An Anonymity Model Achievable Via Microaggregation
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Structural signatures for tree data structures
Proceedings of the VLDB Endowment
Anonymizing bipartite graph data using safe groupings
Proceedings of the VLDB Endowment
Privacy preserving serial data publishing by role composition
Proceedings of the VLDB Endowment
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
Attacks on privacy and deFinetti's theorem
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
L-Cover: Preserving Diversity by Anonymity
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Class-based graph anonymization for social network data
Proceedings of the VLDB Endowment
Optimal random perturbation at multiple privacy levels
Proceedings of the VLDB Endowment
Anonymizing bipartite graph data using safe groupings
The VLDB Journal — The International Journal on Very Large Data Bases
Transparent anonymization: Thwarting adversaries who know the algorithm
ACM Transactions on Database Systems (TODS)
The hardness and approximation algorithms for l-diversity
Proceedings of the 13th International Conference on Extending Database Technology
Algorithm-safe privacy-preserving data publishing
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
k-jump strategy for preserving privacy in micro-data disclosure
Proceedings of the 13th International Conference on Database Theory
Towards an axiomatization of statistical privacy and utility
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Non-homogeneous generalization in privacy preserving data publishing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
P-Sensitive K-Anonymity with Generalization Constraints
Transactions on Data Privacy
Versatile publishing for privacy preservation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing data with quasi-sensitive attribute values
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
Understanding privacy risk of publishing decision trees
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
A family of enhanced (L,α)-diversity models for privacy preserving data publishing
Future Generation Computer Systems
Extending l-diversity to generalize sensitive data
Data & Knowledge Engineering
ρ-uncertainty: inference-proof transaction anonymization
Proceedings of the VLDB Endowment
Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data
Proceedings of the VLDB Endowment
Resisting structural re-identification in anonymized social networks
The VLDB Journal — The International Journal on Very Large Data Bases
Preventing range disclosure in k-anonymised data
Expert Systems with Applications: An International Journal
ACM Transactions on Database Systems (TODS)
Differentially private data cubes: optimizing noise sources and consistency
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Can the Utility of Anonymized Data be Used for Privacy Breaches?
ACM Transactions on Knowledge Discovery from Data (TKDD)
Differentially private data release for data mining
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Personal privacy vs population privacy: learning to attack anonymization
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Privacy beyond single sensitive attribute
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
Cloning for privacy protection in multiple independent data publications
Proceedings of the 20th ACM international conference on Information and knowledge management
Knowledge hiding from tree and graph databases
Data & Knowledge Engineering
Privacy streamliner: a two-stage approach to improving algorithm efficiency
Proceedings of the second ACM conference on Data and Application Security and Privacy
An information theoretic privacy and utility measure for data sanitization mechanisms
Proceedings of the second ACM conference on Data and Application Security and Privacy
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
k-Concealment: An Alternative Model of k-Type Anonymity
Transactions on Data Privacy
MaskIt: privately releasing user context streams for personalized mobile applications
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Data privacy against composition attack
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I
Semi-Edge anonymity: graph publication when the protection algorithm is available
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I
Publishing microdata with a robust privacy guarantee
Proceedings of the VLDB Endowment
Secure distributed framework for achieving ε-differential privacy
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
A propagation model for provenance views of public/private workflows
Proceedings of the 16th International Conference on Database Theory
Lightweight privacy-preserving peer-to-peer data integration
Proceedings of the VLDB Endowment
Updating outsourced anatomized private databases
Proceedings of the 16th International Conference on Extending Database Technology
Information preservation in statistical privacy and bayesian estimation of unattributed histograms
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Outsourcing shortest distance computing with privacy protection
The VLDB Journal — The International Journal on Very Large Data Bases
UMicS: from anonymized data to usable microdata
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Efficient Time-Stamped Event Sequence Anonymization
ACM Transactions on the Web (TWEB)
A general framework for privacy preserving data publishing
Knowledge-Based Systems
Graph publication when the protection algorithm is available
Data & Knowledge Engineering
Multivariate microaggregation by iterative optimization
Applied Intelligence
Hi-index | 0.00 |
Data publishing generates much concern over the protection of individual privacy. Recent studies consider cases where the adversary may possess different kinds of knowledge about the data. In this paper, we show that knowledge of the mechanism or algorithm of anonymization for data publication can also lead to extra information that assists the adversary and jeopardizes individual privacy. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. We call such an attack a minimality attack. In this paper, we introduce a model called m-confidentiality which deals with minimality attacks, and propose a feasible solution. Our experiments show that minimality attacks are practical concerns on real datasets and that our algorithm can prevent such attacks with very little overhead and information loss.