ACM Computing Surveys (CSUR)
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Privacy Protection: p-Sensitive k-Anonymity Property
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
Achieving anonymity via clustering
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Injecting utility into anonymized datasets
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Utility-based anonymization using local recoding
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Utility-based anonymization for privacy preservation with less information loss
ACM SIGKDD Explorations Newsletter
Capturing data usefulness and privacy protection in K-anonymisation
Proceedings of the 2007 ACM symposium on Applied computing
An efficient clustering method for k-anonymization
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data
PST '08 Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust
Efficient k-anonymization using clustering techniques
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
P-Sensitive K-Anonymity with Generalization Constraints
Transactions on Data Privacy
Data anonymization using an improved utility measurement
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
ICDT'05 Proceedings of the 10th international conference on Database Theory
Utility-guided Clustering-based Transaction Data Anonymization
Transactions on Data Privacy
An Enhanced Utility-Driven Data Anonymization Method
Transactions on Data Privacy
SHB 2012: international workshop on smart health and wellbeing
Proceedings of the 21st ACM international conference on Information and knowledge management
Hi-index | 0.00 |
Many data privacy models have been created in the last few years using the k-anonymization methodology including l-diversity, p-sensitive k-anonymity, and t-closeness. While these methods differ in their approaches and quality of the results, they all focus on ensuring the anonymization of the data while at the same time attempt to protect the quality of the data by minimizing the loss of the information contained in the original data set. In this paper, we propose an automated k-anonymity approach that uses clustering to maximize the utility of the data while ensuring that the data privacy is maintained. Our method employs data constraint rules, which are defined by the data research expert to represent especially informative distributions in categorical attributes or inflections points in a continuous attribute. The values of the data constraints are an integral component of our utility function, which is used to maximize the utility of the anonymized dataset. Finally, we present our experimental results that show that our approach meets or exceeds existing methods that do not incorporate data constraint rules.