Towards Preference-Constrained k-Anonymisation

  • Authors:
  • Grigorios Loukides;Achilles Tziatzios;Jianhua Shao

  • Affiliations:
  • School of Computer Science, Cardiff University, Cardiff, UK CF24 3AA;School of Computer Science, Cardiff University, Cardiff, UK CF24 3AA;School of Computer Science, Cardiff University, Cardiff, UK CF24 3AA

  • Venue:
  • Database Systems for Advanced Applications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we propose a novel preference-constrained approach to k-anonymisation. In contrast to the existing works on k-anonymisation which attempt to satisfy a minimum level of protection requirement as a constraint and then optimise data utility within that constraint, we allow data owners and users to specify their detailed protection and usage requirements as a set of preferences on attributes or data values, treat such preferences as constraints and solve them as a multi-objective optimisation problem. This ensures that anonymised data will be actually useful to data users in their applications and sufficiently protected for data owners. Our preliminary experiments show that our method is capable of producing anonymisations that satisfy a range of preferences and have a high level of data utility and protection.