On the complexity of restricted k-anonymity problem

  • Authors:
  • Xiaoxun Sun;Hua Wang;Jiuyong Li

  • Affiliations:
  • Department of Mathematics & Computing, University of Southern Queensland, QLD, Australia;Department of Mathematics & Computing, University of Southern Queensland, QLD, Australia;School of Computer and Information Science, University of South Australia, Adelaide, Australia

  • Venue:
  • APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

One of the emerging concepts in microdata protection is k- anonymity, introduced by Samarati and Sweeney. k-anonymity provides a simple and efficient approach to protect private individual information and is gaining increasing popularity. k-anonymity requires that every tuple (record) in the microdata table released be indistinguishably related to no fewer than k respondents. In this paper, we introduce two new variants of the k-anonymity problem, namely, the Restricted k-anonymity problem and Restricted k-anonymity problem on attribute (where suppressing the entire attribute is allowed). We prove that both problems are NP-hard for k ≥ 3. The results imply the main results obtained by Meyerson and Williams. On the positive side, we develop a polynomial time algorithm for the Restricted 2-anonymity problem by giving a graphical representation of the microdata table.