{"title":"Local synthesis for disclosure limitation that satisfies probabilistic <i>k</i>-anonymity criterion.","authors":"Anna Oganian, Josep Domingo-Ferrer","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Before releasing databases which contain sensitive information about individuals, data publishers must apply Statistical Disclosure Limitation (SDL) methods to them, in order to avoid disclosure of sensitive information on any identifiable data subject. SDL methods often consist of masking or synthesizing the original data records in such a way as to minimize the risk of disclosure of the sensitive information while providing data users with accurate information about the population of interest. In this paper we propose a new scheme for disclosure limitation, based on the idea of <i>local synthesis</i> of data. Our approach is predicated on model-based clustering. The proposed method satisfies the requirements of <i>k</i>-anonymity; in particular we use a variant of the <i>k</i>-anonymity privacy model, namely probabilistic <i>k</i>-anonymity, by incorporating constraints on cluster cardinality. Regarding data utility, for continuous attributes, we exactly preserve means and covariances of the original data, while approximately preserving higher-order moments and analyses on subdomains (defined by clusters and cluster combinations). For both continuous and categorical data, our experiments with medical data sets show that, from the point of view of data utility, local synthesis compares very favorably with other methods of disclosure limitation including the sequential regression approach for synthetic data generation.</p>","PeriodicalId":44319,"journal":{"name":"Transactions on Data Privacy","volume":"10 1","pages":"61-81"},"PeriodicalIF":0.9,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6760907/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144180249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A model driven approach to data privacy verification in E-Health systems","authors":"AmatoFlora, MoscatoFrancesco","doi":"10.5555/2870503.2870506","DOIUrl":"https://doi.org/10.5555/2870503.2870506","url":null,"abstract":"Last years experienced the growth of new technologies able to remotely monitor health state of persons. This includes both (even complex) Medical devices and all kind of wearable device. In additio...","PeriodicalId":44319,"journal":{"name":"Transactions on Data Privacy","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71137011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute Based Group Key Management","authors":"NabeelMohamed, BertinoElisa","doi":"10.5555/2870614.2870619","DOIUrl":"https://doi.org/10.5555/2870614.2870619","url":null,"abstract":"Attribute based systems enable fine-grained access control among a group of users each identified by a set of attributes. Secure collaborative applications need such flexible attribute based system...","PeriodicalId":44319,"journal":{"name":"Transactions on Data Privacy","volume":"19 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71136872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving Differential Privacy in Degree-Correlation based Graph Generation.","authors":"Yue Wang, Xintao Wu","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum) on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enforce differential privacy on graph model parameters learned from the original network and then generate the graphs for releasing using the graph model with the private parameters. In particular, we develop a differential privacy preserving graph generator based on the dK-graph generation model. We first derive from the original graph various parameters (i.e., degree correlations) used in the dK-graph model, then enforce edge differential privacy on the learned parameters, and finally use the dK-graph model with the perturbed parameters to generate graphs. For the 2K-graph model, we enforce the edge differential privacy by calibrating noise based on the smooth sensitivity, rather than the global sensitivity. By doing this, we achieve the strict differential privacy guarantee with smaller magnitude noise. We conduct experiments on four real networks and compare the performance of our private dK-graph models with the stochastic Kronecker graph generation model in terms of utility and privacy tradeoff. Empirical evaluations show the developed private dK-graph generation models significantly outperform the approach based on the stochastic Kronecker generation model.</p>","PeriodicalId":44319,"journal":{"name":"Transactions on Data Privacy","volume":"6 2","pages":"127-145"},"PeriodicalIF":1.7,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3979555/pdf/nihms-555508.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32256559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving Differential Privacy in Degree-Correlation based Graph Generation","authors":"WangYue, WUXin-Tao","doi":"10.5555/2612167.2612168","DOIUrl":"https://doi.org/10.5555/2612167.2612168","url":null,"abstract":"Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is d...","PeriodicalId":44319,"journal":{"name":"Transactions on Data Privacy","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71130902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practicing Differential Privacy in Health Care","authors":"K. DankarFida, El EmamKhaled","doi":"10.5555/2612156.2612159","DOIUrl":"https://doi.org/10.5555/2612156.2612159","url":null,"abstract":"Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It has also been pro...","PeriodicalId":44319,"journal":{"name":"Transactions on Data Privacy","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71130195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoqian Jiang, Zhanglong Ji, Shuang Wang, Noman Mohammed, Samuel Cheng, Lucila Ohno-Machado
{"title":"Differential-Private Data Publishing Through Component Analysis.","authors":"Xiaoqian Jiang, Zhanglong Ji, Shuang Wang, Noman Mohammed, Samuel Cheng, Lucila Ohno-Machado","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>A reasonable compromise of privacy and utility exists at an \"appropriate\" resolution of the data. We proposed novel mechanisms to achieve privacy preserving data publishing (PPDP) satisfying ε-<i>differential privacy</i> with improved utility through <i>component analysis</i>. The mechanisms studied in this article are Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA). The differential PCA-based PPDP serves as a general-purpose data dissemination tool that guarantees better utility (i.e., smaller error) compared to Laplacian and Exponential mechanisms using the same \"privacy budget\". Our second mechanism, the differential LDA-based PPDP, favors data dissemination for classification purposes. Both mechanisms were compared with state-of-the-art methods to show performance differences.</p>","PeriodicalId":44319,"journal":{"name":"Transactions on Data Privacy","volume":"6 1","pages":"19-34"},"PeriodicalIF":1.7,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3883117/pdf/nihms456798.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32017146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The PROBE Framework for the Personalized Cloaking of Private Locations","authors":"D. Luisa, BertinoElisa, SilvestriClaudio","doi":"10.5555/1824401.1824404","DOIUrl":"https://doi.org/10.5555/1824401.1824404","url":null,"abstract":"The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscation (or cloaking),...","PeriodicalId":44319,"journal":{"name":"Transactions on Data Privacy","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2010-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71123236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guy Lebanon, M. Scannapieco, Mohamed R. Fouad, E. Bertino
{"title":"Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk","authors":"Guy Lebanon, M. Scannapieco, Mohamed R. Fouad, E. Bertino","doi":"10.1007/11930242_19","DOIUrl":"https://doi.org/10.1007/11930242_19","url":null,"abstract":"","PeriodicalId":44319,"journal":{"name":"Transactions on Data Privacy","volume":"78 1","pages":"217-232"},"PeriodicalIF":1.7,"publicationDate":"2006-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74210167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}