How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Unconditional sender and recipient untraceability in spite of active attacks
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Efficient anonymous channel and all/nothing election scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Generalizing data to provide anonymity when disclosing information (abstract)
PODS '98 Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Hordes: a multicast based protocol for anonymity
Journal of Computer Security
Optimistic Mixing for Exit-Polls
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications
ISC '02 Proceedings of the 5th International Conference on Information Security
On the Security of ElGamal Based Encryption
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
An architecture for privacy-preserving mining of client information
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
k-anonymous message transmission
Proceedings of the 10th ACM conference on Computer and communications security
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Using randomized response techniques for privacy-preserving data mining
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
GeneScout: a data mining system for predicting vertebrate genes in genomic DNA sequences
Information Sciences: an International Journal - Special issue: Soft computing data mining
k-TTP: a new privacy model for large-scale distributed environments
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-Preserving Outlier Detection
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Top-Down Specialization for Information and Privacy Preservation
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Deriving private information from randomized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Anonymity-preserving data collection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Fuzzy reasoning model under quotient space structure
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Dealing with uncertainty in data mining and information extraction
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Efficient anonymity-preserving data collection
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
(α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Utility-based anonymization using local recoding
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data
ICDEW '05 Proceedings of the 21st International Conference on Data Engineering Workshops
Foundations of Cryptography: Volume 1
Foundations of Cryptography: Volume 1
Controlling inference: avoiding p-level reduction during analysis
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Two methods for privacy preserving data mining with malicious participants
Information Sciences: an International Journal
Tuning anonymity level for assuring high data quality: an empirical study.
ESEM '07 Proceedings of the First International Symposium on Empirical Software Engineering and Measurement
Privacy preserving data mining of sequential patterns for network traffic data
Information Sciences: an International Journal
Guided perturbation: towards private and accurate mining
The VLDB Journal — The International Journal on Very Large Data Bases
Information Sciences: an International Journal
Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
A false negative approach to mining frequent itemsets from high speed transactional data streams
Information Sciences: an International Journal
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
Information Sciences: an International Journal
Learning latent variable models from distributed and abstracted data
Information Sciences: an International Journal
Distributed privacy preserving data collection
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I
Sanitizing microdata without leak: combining preventive and curative actions
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
CrowdLogging: distributed, private, and anonymous search logging
Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval
A modification of the Lloyd algorithm for k-anonymous quantization
Information Sciences: an International Journal
Verification of initial-state opacity in security applications of discrete event systems
Information Sciences: an International Journal
Hi-index | 0.07 |
To protect individual privacy in data mining, when a miner collects data from respondents, the respondents should remain anonymous. The existing technique of Anonymity-Preserving Data Collection partially solves this problem, but it assumes that the data do not contain any identifying information about the corresponding respondents. On the other hand, the existing technique of Privacy-Enhancing k-Anonymization can make the collected data anonymous by eliminating the identifying information. However, it assumes that each respondent submits her data through an unidentified communication channel. In this paper, we propose k-Anonymous Data Collection, which has the advantages of both Anonymity-Preserving Data Collection and Privacy-Enhancing k-Anonymization but does not rely on their assumptions described above. We give rigorous proofs for the correctness and privacy of our protocol, and experimental results for its efficiency. Furthermore, we extend our solution to the fully malicious model, in which a dishonest participant can deviate from the protocol and behave arbitrarily.