{"title":"Towards a Common Notion of Privacy Leakage on Public Database","authors":"S. Kiyomoto, K. Martin","doi":"10.1109/BWCCA.2010.69","DOIUrl":null,"url":null,"abstract":"Two different approaches to defining a notion of database privacy, the generalization method and the perturbation method, have been independently studied. These two approaches are significantly different, making it hard to compare related research. In this paper, we propose a unified model that is based on the perturbation method, but which is applicable to generalized data sets. In particular, this model applies the notion of differential privacy to data sets that satisfy $k$-anonymity. We demonstrate this approach through a simple case study. This is a first step towards a common notion for protecting database privacy.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2010.69","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Two different approaches to defining a notion of database privacy, the generalization method and the perturbation method, have been independently studied. These two approaches are significantly different, making it hard to compare related research. In this paper, we propose a unified model that is based on the perturbation method, but which is applicable to generalized data sets. In particular, this model applies the notion of differential privacy to data sets that satisfy $k$-anonymity. We demonstrate this approach through a simple case study. This is a first step towards a common notion for protecting database privacy.