skip to main content
10.1145/1363686.1363936acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Adaptive data anonymization against information fusion based privacy attacks on enterprise data

Published:16 March 2008Publication History

ABSTRACT

Privacy preservation is currently one of the key challenges in enterprise data management. Data Anonymization techniques address this by sanitizing and releasing anonymized data such that enterprises can share and disseminate sensitive information without compromising consumer privacy. However, current anonymization techniques are prone to attacks where-in an intruder can fuse external information with the anonymized data to infer sensitive information. In this paper, we pose and formulate the problem of Information Fusion based Privacy Attack. We experimentally demonstrate such an attack on a publicly available data set. We propose adaptive anonymization schemes to address this problem and experimentally demonstrate a prototype solution.

References

  1. R. Bayardo and R. Aggarwal. Data privacy through optimal k-anonymization. In ICDE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Domingo-Ferrer. Practical data oriented microaggregation for statistical disclosure control. IEEE TKDE, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Kosko. Neural Networks and Fuzzy Systems. Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report, CMU, 1998.Google ScholarGoogle Scholar

Index Terms

  1. Adaptive data anonymization against information fusion based privacy attacks on enterprise data

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SAC '08: Proceedings of the 2008 ACM symposium on Applied computing
              March 2008
              2586 pages
              ISBN:9781595937537
              DOI:10.1145/1363686

              Copyright © 2008 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 16 March 2008

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • poster

              Acceptance Rates

              Overall Acceptance Rate1,650of6,669submissions,25%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader