Journal of Computer and System Sciences
Updating outsourced anatomized private databases
Proceedings of the 16th International Conference on Extending Database Technology
Anonymizing sequential releases under arbitrary updates
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Hi-index | 0.00 |
In comparison to the extensive body of existing work considering publish-once, static anonymization, dynamic anonymization is less well studied. Previous work, most notably m-invariance, has made considerable progress in devising a scheme that attempts to prevent individual records from being associated with too few sensitive values. We show, however, that in the presence of updates, even an m-invariant table can be exploited by a new type of attack we call the "equivalence-attack." To deal with the equivalence attack, we propose a graph-based anonymization algorithm that leverages solutions to the classic "min-cut/max-flow" problem, and demonstrate with experiments that our algorithm is efficient and effective in preventing equivalence attacks.