How Anonymous Is k-Anonymous? Look at Your Quasi-ID

  • Authors:
  • Claudio Bettini;X. Sean Wang;Sushil Jajodia

  • Affiliations:
  • Dico, University of Milan, Italy;Dept of CS, University of Vermont, USA;CSIS, George Mason University, USA

  • Venue:
  • SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The concept of quasi-ID (QI) is fundamental to the notion of k-anonymity that has gained popularity recently as a privacy-preserving method in microdata publication. This paper shows that it is important to provide QI with a formal underpinning, which, surprisingly, has been generally absent in the literature. The study presented in this paper provides a first look at the correct and incorrect uses of QI in k-anonymization processes and exposes the implicit conservative assumptions when QI is used correctly. The original notions introduced in this paper include (1) k-anonymity under the assumption of a formally defined external information source, independent of the QI notion, and (2) k-QI, which is an extension of the traditional QI and is shown to be a necessary refinement. The concept of k-anonymity defined in a world without using QI is an interesting artifact itself, but more importantly, it provides a sound framework to gauge the use of QI for k-anonymization.