Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Cryptography and data security
Cryptography and data security
Clustering Algorithms
Inference Control in Statistical Databases, From Theory to Practice
LHS-Based Hybrid Microdata vs Rank Swapping and Microaggregation for Numeric Microdata Protection
Inference Control in Statistical Databases, From Theory to Practice
Model Based Disclosure Protection
Inference Control in Statistical Databases, From Theory to Practice
Auditing Interval-Based Inference
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
A Privacy-Enhanced Microaggregation Method
FoIKS '02 Proceedings of the Second International Symposium on Foundations of Information and Knowledge Systems
Exact and approximate methods for data directed microaggregation in one or more dimensions
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
On the security of microaggregation with individual ranking: analytical attacks
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Aggregation techniques for statistical confidentiality
Aggregation operators
Information Sciences—Informatics and Computer Science: An International Journal
Spatial and non-spatial model-based protection procedures for the release of business microdata
Statistics and Computing
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Assessing global disclosure risk in masked microdata
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Minimum Spanning Tree Partitioning Algorithm for Microaggregation
IEEE Transactions on Knowledge and Data Engineering
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Efficient multivariate data-oriented microaggregation
The VLDB Journal — The International Journal on Very Large Data Bases
Towards the Diversity of Sensitive Attributes in k-Anonymity
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
TFRP: An efficient microaggregation algorithm for statistical disclosure control
Journal of Systems and Software
Rethinking rank swapping to decrease disclosure risk
Data & Knowledge Engineering
A polynomial-time approximation to optimal multivariate microaggregation
Computers & Mathematics with Applications
On static and dynamic methods for condensation-based privacy-preserving data mining
ACM Transactions on Database Systems (TODS)
Adaptive data anonymization against information fusion based privacy attacks on enterprise data
Proceedings of the 2008 ACM symposium on Applied computing
An efficient hash-based algorithm for minimal k-anonymity
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
Data utility and privacy protection trade-off in k-anonymisation
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
An Anonymity Model Achievable Via Microaggregation
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
On the disclosure risk of multivariate microaggregation
Data & Knowledge Engineering
Disclosure Analysis and Control in Statistical Databases
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
IDEAL '08 Proceedings of the 9th International Conference on Intelligent Data Engineering and Automated Learning
A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets
MDAI '08 Sabadell Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence
Improving Microaggregation for Complex Record Anonymization
MDAI '08 Sabadell Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence
An AI-Based Causal Strategy for Securing Statistical Databases Using Micro-aggregation
AI '08 Proceedings of the 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Importance partitioning in micro-aggregation
Computational Statistics & Data Analysis
Towards the evaluation of time series protection methods
Information Sciences: an International Journal
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
Transactions on Data Privacy
Constrained Microaggregation: Adding Constraints for Data Editing
Transactions on Data Privacy
A distributed approach to enabling privacy-preserving model-based classifier training
Knowledge and Information Systems
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Privacy and anonymization for very large datasets
Proceedings of the 18th ACM conference on Information and knowledge management
Bregman divergences in the (m×k)-partitioning problem
Computational Statistics & Data Analysis
A new framework to automate constrained microaggregation
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Density-based microaggregation for statistical disclosure control
Expert Systems with Applications: An International Journal
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
A three-dimensional conceptual framework for database privacy
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
ICICS'07 Proceedings of the 9th international conference on Information and communications security
ONN the use of neural networks for data privacy
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Preserving privacy in participatory sensing systems
Computer Communications
Hybrid microdata using microaggregation
Information Sciences: an International Journal
Suppressing microdata to prevent classification based inference
The VLDB Journal — The International Journal on Very Large Data Bases
Comparison of microaggregation approaches on anonymized data quality
Expert Systems with Applications: An International Journal
Anonymization of moving objects databases by clustering and perturbation
Information Systems
Microdata protection through approximate microaggregation
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Privacy-preserving publication of trajectories using microaggregation
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Privacy disclosure analysis and control for 2D contingency tables containing inaccurate data
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Measurement error and statistical disclosure control
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Semantic microaggregation for the anonymization of query logs
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Disclosure risk of synthetic population data with application in the case of EU-SILC
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Software—Practice & Experience - Focus on Selected PhD Literature Reviews in the Practical Aspects of Software Technology
Fuzzy based clustering algorithm for privacy preserving data mining
International Journal of Business Information Systems
Towards semantic microaggregation of categorical data for confidential documents
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
Edit constraints on microaggregation and additive noise
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
An approximate microaggregation approach for microdata protection
Expert Systems with Applications: An International Journal
Weak k-anonymity: a low-distortion model for protecting privacy
ISC'06 Proceedings of the 9th international conference on Information Security
Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data
Information Systems Research
Achieving k-anonymity by clustering in attribute hierarchical structures
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
Extending microaggregation procedures for time series protection
RSCTC'06 Proceedings of the 5th international conference on Rough Sets and Current Trends in Computing
On optimizing the k-ward micro-aggregation technique for secure statistical databases
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Microaggregation for database and location privacy
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
A fixed structure learning automaton micro-aggregation technique for secure statistical databases
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Optimal multivariate 2-microaggregation for microdata protection: a 2-approximation
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Software development for SDC in r
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
User k-anonymity for privacy preserving data mining of query logs
Information Processing and Management: an International Journal
Providing group anonymity using wavelet transform
BNCOD'10 Proceedings of the 27th British national conference on Data Security and Security Data
Information fusion in data privacy: A survey
Information Fusion
Kd-trees and the real disclosure risks of large statistical databases
Information Fusion
Microaggregation- and permutation-based anonymization of movement data
Information Sciences: an International Journal
Another greedy heuristic for the constrained forest problem
Operations Research Letters
Privacy bubbles: user-centered privacy control for mobile content sharing applications
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Semantically-grounded construction of centroids for datasets with textual attributes
Knowledge-Based Systems
A modification of the Lloyd algorithm for k-anonymous quantization
Information Sciences: an International Journal
A modification of the k-means method for quasi-unsupervised learning
Knowledge-Based Systems
Testing of IHSN c++ code and inclusion of new methods into sdcmicro
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Clustering-based categorical data protection
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Anonymization methods for taxonomic microdata
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Marginality: a numerical mapping for enhanced exploitation of taxonomic attributes
MDAI'12 Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence
Optimal univariate microaggregation with data suppression
Journal of Systems and Software
Information Security Tech. Report
Priority driven k-anonymisation for privacy protection
AusDM '08 Proceedings of the 7th Australasian Data Mining Conference - Volume 87
Journal of Biomedical Informatics
Class-Restricted Clustering and Microperturbation for Data Privacy
Management Science
Towards a private vector space model for confidential documents
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Privacy preserving release of blogosphere data in the presence of search engines
Information Processing and Management: an International Journal
Developing privacy solutions for sharing and analysing healthcare data
International Journal of Business Information Systems
MAGE: A semantics retaining K-anonymization method for mixed data
Knowledge-Based Systems
Multivariate microaggregation by iterative optimization
Applied Intelligence
Journal of Computer Security
Hi-index | 0.01 |
Microaggregation is a statistical disclosure control technique for microdata disseminated in statistical databases. Raw microdata (i.e., individual records or data vectors) are grouped into small aggregates prior to publication. Each aggregate should contain at least $k$ data vectors to prevent disclosure of individual information, where $k$ is a constant value preset by the data protector. No exact polynomial algorithms are known to date to microaggregate optimally, i.e., with minimal variability loss. Methods in the literature rank data and partition them into groups of fixed-size; in the multivariate case, ranking is performed by projecting data vectors onto a single axis. In this paper, candidate optimal solutions to the multivariate and univariate microaggregation problems are characterized. In the univariate case, two heuristics based on hierarchical clustering and genetic algorithms are introduced which are data-oriented in that they try to preserve natural data aggregates. In the multivariate case, fixed-size and hierarchical clustering microaggregation algorithms are presented which do not require data to be projected onto a single dimension; such methods clearly reduce variability loss as compared to conventional multivariate microaggregation on projected data.