Generalizing data to provide anonymity when disclosing information (abstract)
PODS '98 Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
To do or not to do: the dilemma of disclosing anonymized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Checking for k-anonymity violation by views
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Achieving anonymity via clustering
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Injecting utility into anonymized datasets
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
A crossover operator for the k- anonymity problem
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing sequential releases
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
(α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Utility-based anonymization using local recoding
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
A reconstruction-based algorithm for classification rules hiding
ADC '06 Proceedings of the 17th Australasian Database Conference - Volume 49
A secure distributed framework for achieving k-anonymity
The VLDB Journal — The International Journal on Very Large Data Bases
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Probabilistic privacy analysis of published views
Proceedings of the 5th ACM workshop on Privacy in electronic society
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Utility-based anonymization for privacy preservation with less information loss
ACM SIGKDD Explorations Newsletter
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
On anonymizing query logs via token-based hashing
Proceedings of the 16th international conference on World Wide Web
Capturing data usefulness and privacy protection in K-anonymisation
Proceedings of the 2007 ACM symposium on Applied computing
K-anonymization incremental maintenance and optimization techniques
Proceedings of the 2007 ACM symposium on Applied computing
Approximate algorithms for K-anonymity
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
M-invariance: towards privacy preserving re-publication of dynamic datasets
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Anonymizing Classification Data for Privacy Preservation
IEEE Transactions on Knowledge and Data Engineering
Sanitization models and their limitations
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
TFRP: An efficient microaggregation algorithm for statistical disclosure control
Journal of Systems and Software
Data & Knowledge Engineering
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Information disclosure under realistic assumptions: privacy versus optimality
Proceedings of the 14th ACM conference on Computer and communications security
k-Unlinkability: A privacy protection model for distributed data
Data & Knowledge Engineering
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Fast data anonymization with low information loss
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
On static and dynamic methods for condensation-based privacy-preserving data mining
ACM Transactions on Database Systems (TODS)
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Towards optimal k-anonymization
Data & Knowledge Engineering
Anonymity for continuous data publishing
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Privacy preserving data obfuscation for inherently clustered data
International Journal of Information and Computer Security
A framework for condensation-based anonymization of string data
Data Mining and Knowledge Discovery
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
An efficient hash-based algorithm for minimal k-anonymity
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy Preserving Data Mining Research: Current Status and Key Issues
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
A k-Anonymity Clustering Method for Effective Data Privacy Preservation
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Data Quality in Privacy Preservation for Associative Classification
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
How Anonymous Is k-Anonymous? Look at Your Quasi-ID
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries
COCOA 2008 Proceedings of the 2nd international conference on Combinatorial Optimization and Applications
Privacy-preserving anonymization of set-valued data
Proceedings of the VLDB Endowment
Towards privacy-preserving integration of distributed heterogeneous data
Proceedings of the 2nd PhD workshop on Information and knowledge management
Information Leakage in Optimal Anonymized and Diversified Data
Information Hiding
L-Diversity Based Dynamic Update for Large Time-Evolving Microdata
AI '08 Proceedings of the 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
A Novel Heuristic Algorithm for Privacy Preserving of Associative Classification
PRICAI '08 Proceedings of the 10th Pacific Rim International Conference on Artificial Intelligence: Trends in Artificial Intelligence
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
AlphaSum: size-constrained table summarization using value lattices
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Continuous privacy preserving publishing of data streams
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy-preserving incremental data dissemination
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Evaluating privacy threats in released database views by symmetric indistinguishability
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Information disclosure by answers to XPath queries
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Privacy protection for RFID data
Proceedings of the 2009 ACM symposium on Applied Computing
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
A framework for efficient data anonymization under privacy and accuracy constraints
ACM Transactions on Database Systems (TODS)
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Transactions on Data Privacy
Information Sciences: an International Journal
Data and Structural k-Anonymity in Social Networks
Privacy, Security, and Trust in KDD
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
On Distributed k-Anonymization
Fundamenta Informaticae
Privacy aware data sharing: balancing the usability and privacy of datasets
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
WADS '09 Proceedings of the 11th International Symposium on Algorithms and Data Structures
(α, k)-anonymous data publishing
Journal of Intelligent Information Systems
L-Cover: Preserving Diversity by Anonymity
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
A novel anonymization algorithm: Privacy protection and knowledge preservation
Expert Systems with Applications: An International Journal
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
An integrated framework for de-identifying unstructured medical data
Data & Knowledge Engineering
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Proceedings of the 18th ACM conference on Information and knowledge management
Applying differential privacy to search queries in a policy based interactive framework
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
Incremental privacy preservation for associative classification
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
StarClique: guaranteeing user privacy in social networks against intersection attacks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
Publishing naive Bayesian classifiers: privacy without accuracy loss
Proceedings of the VLDB Endowment
Secure construction of k-unlinkable patient records from distributed providers
Artificial Intelligence in Medicine
COP: privacy-preserving multidimensional partition in DAS paradigm
Proceedings of the 2009 EDBT/ICDT Workshops
Transparent anonymization: Thwarting adversaries who know the algorithm
ACM Transactions on Database Systems (TODS)
The hardness and approximation algorithms for l-diversity
Proceedings of the 13th International Conference on Extending Database Technology
Reducing metadata complexity for faster table summarization
Proceedings of the 13th International Conference on Extending Database Technology
Algorithm-safe privacy-preserving data publishing
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Restoring compromised privacy in micro-data disclosure
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
(α, k)-anonymity based privacy preservation by lossy join
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
k-anonymization without Q-S associations
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
K-anonymization with minimal loss of information
ESA'07 Proceedings of the 15th annual European conference on Algorithms
Efficient k-anonymization using clustering techniques
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Capture inference attacks for K-anonymity with privacy inference logic
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Risk & distortion based K-anonymity
WISA'07 Proceedings of the 8th international conference on Information security applications
Privacy inference attacking and prevention on multiple relative k-anonymized microdata sets
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
On the complexity of restricted k-anonymity problem
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Allowing privacy protection algorithms to jump out of local optimums: an ordered greed framework
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Achieving anonymity via clustering
ACM Transactions on Algorithms (TALG)
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
k-jump strategy for preserving privacy in micro-data disclosure
Proceedings of the 13th International Conference on Database Theory
Non-homogeneous generalization in privacy preserving data publishing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Preserving privacy and fairness in peer-to-peer data integration
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Movement Data Anonymity through Generalization
Transactions on Data Privacy
Efficient Anonymizations with Enhanced Utility
Transactions on Data Privacy
Versatile publishing for privacy preservation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymization of moving objects databases by clustering and perturbation
Information Systems
Approximate algorithms with generalizing attribute values for k-anonymity
Information Systems
Systematic clustering method for l-diversity model
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
Microdata protection through approximate microaggregation
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Preserving privacy in semantic-rich trajectories of human mobility
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Search-log anonymization and advertisement: are they mutually exclusive?
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
On the identification of property based generalizations in microdata anonymization
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming
Resolving the complexity of some data privacy problems
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Synthesizing: art of anonymization
DEXA'10 Proceedings of the 21st international conference on Database and expert systems applications: Part I
Theory of privacy and anonymity
Algorithms and theory of computation handbook
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A family of enhanced (L,α)-diversity models for privacy preserving data publishing
Future Generation Computer Systems
Extending l-diversity to generalize sensitive data
Data & Knowledge Engineering
Personalized privacy protection in social networks
Proceedings of the VLDB Endowment
Preventing range disclosure in k-anonymised data
Expert Systems with Applications: An International Journal
Extended k-anonymity models against sensitive attribute disclosure
Computer Communications
Local and global recoding methods for anonymizing set-valued data
The VLDB Journal — The International Journal on Very Large Data Bases
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving data sharing in cloud computing
Journal of Computer Science and Technology
Anonymizing Set-Valued Social Data
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
A user-oriented anonymization mechanism for public data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
FAANST: fast anonymizing algorithm for numerical streaming data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Parameterized complexity of k-anonymity: hardness and tractability
IWOCA'10 Proceedings of the 21st international conference on Combinatorial algorithms
Anonymizing shortest paths on social network graphs
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
Distributed privacy preserving data collection
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I
C-safety: a framework for the anonymization of semantic trajectories
Transactions on Data Privacy
Privacy preservation for associative classification: an approximation algorithm
International Journal of Business Intelligence and Data Mining
Protecting privacy in data release
Foundations of security analysis and design VI
Pattern-guided data anonymization and clustering
MFCS'11 Proceedings of the 36th international conference on Mathematical foundations of computer science
On the complexity of the l-diversity problem
MFCS'11 Proceedings of the 36th international conference on Mathematical foundations of computer science
The effect of homogeneity on the complexity of k-anonymity
FCT'11 Proceedings of the 18th international conference on Fundamentals of computation theory
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
An approximate microaggregation approach for microdata protection
Expert Systems with Applications: An International Journal
Cloning for privacy protection in multiple independent data publications
Proceedings of the 20th ACM international conference on Information and knowledge management
Sharing graphs using differentially private graph models
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Weak k-anonymity: a low-distortion model for protecting privacy
ISC'06 Proceedings of the 9th international conference on Information Security
ACM Transactions on Intelligent Systems and Technology (TIST)
k-Anonymous Decision Tree Induction
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Can attackers learn from samples?
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Data anonymization using an improved utility measurement
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Authorization-Transparent access control for XML under the non-truman model
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
Achieving k-anonymity by clustering in attribute hierarchical structures
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
On t-closeness with KL-divergence and semantic privacy
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
ICDT'05 Proceedings of the 10th international conference on Database Theory
Finding all maximally-matchable edges in a bipartite graph
Theoretical Computer Science
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
Indistinguishability: the other aspect of privacy
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Information disclosure by XPath queries
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Towards a more reasonable generalization cost metric for k-anonymization
BNCOD'06 Proceedings of the 23rd British National Conference on Databases, conference on Flexible and Efficient Information Handling
Distributed data mining protocols for privacy: a review of some recent results
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Towards an anti-inference (k, ℓ)-anonymity model with value association rules
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Next place prediction using mobility Markov chains
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
Secure distributed computation of anonymized views of shared databases
ACM Transactions on Database Systems (TODS)
A practical approximation algorithm for optimal k-anonymity
Data Mining and Knowledge Discovery
k-Concealment: An Alternative Model of k-Type Anonymity
Transactions on Data Privacy
On the inapproximability of maximum intersection problems
Information Processing Letters
Detecting dependencies in an anonymized dataset
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Publishing microdata with a robust privacy guarantee
Proceedings of the VLDB Endowment
On Distributed k-Anonymization
Fundamenta Informaticae
A clustering approach for structural k-anonymity in social networks using genetic algorithm
Proceedings of the CUBE International Information Technology Conference
An automated data utility clustering methodology using data constraint rules
Proceedings of the 2012 international workshop on Smart health and wellbeing
A stab at approximating minimum subadditive join
WADS'07 Proceedings of the 10th international conference on Algorithms and Data Structures
An Enhanced Utility-Driven Data Anonymization Method
Transactions on Data Privacy
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part I
Efficient discovery of de-identification policy options through a risk-utility frontier
Proceedings of the third ACM conference on Data and application security and privacy
Protecting User Privacy Better with Query l-Diversity
International Journal of Information Security and Privacy
Priority driven k-anonymisation for privacy protection
AusDM '08 Proceedings of the 7th Australasian Data Mining Conference - Volume 87
AIM: a new privacy preservation algorithm for incomplete microdata based on anatomy
ICPCA/SWS'12 Proceedings of the 2012 international conference on Pervasive Computing and the Networked World
Application and analysis of multidimensional negative surveys in participatory sensing applications
Pervasive and Mobile Computing
Fast clustering-based anonymization approaches with time constraints for data streams
Knowledge-Based Systems
STK-anonymity: k-anonymity of social networks containing both structural and textual information
Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks
Parameterized complexity of k-anonymity: hardness and tractability
Journal of Combinatorial Optimization
Incremental processing and indexing for k, e-anonymisation
International Journal of Information and Computer Security
The hardness of (ε, m)-anonymity
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
Incorporating Privacy into the Undergraduate Curriculum
Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference
Efficient Time-Stamped Event Sequence Anonymization
ACM Transactions on the Web (TWEB)
The effect of homogeneity on the computational complexity of combinatorial data anonymization
Data Mining and Knowledge Discovery
The l-Diversity problem: Tractability and approximability
Theoretical Computer Science
Journal of Computer Security
K-anonymous path privacy on social graphs
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology
Hi-index | 0.01 |
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data integrity. We prove that two general versions of optimal k-anonymization of relations are NP-hard, including the suppression version which amounts to choosing a minimum number of entries to delete from the relation. We also present a polynomial time algorithm for optimal k-anonymity that achieves an approximation ratio independent of the size of the database, when k is constant. In particular, it is a O(k log k)-approximation where the constant in the big-O is no more than 4, However, the runtime of the algorithm is exponential in k. A slightly more clever algorithm removes this condition, but is a O(k log m)-approximation, where m is the degree of the relation. We believe this algorithm could potentially be quite fast in practice.