Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Method for measuring the privacy level of pre-published dataset

Several privacy protection technologies have been designed for protecting individuals’ privacy information in data publishing. It is often easy to make additional information loss of a dataset without measuring the strength of privacy protection it required. To apply appropriate strength of privacy preservation, the authors put forward privacy score, a new metric for making a comprehensive evaluation of the privacy information contained in the pre-published dataset. Using this measure, publishers can apply the privacy techniques to the pre-published dataset in accordance with the privacy level it belongs to. The privacy score is determined by the amount as well as the quality of privacy information in which the pre-published dataset is contained. Furthermore, the authors present a data sensitivity model based on analytic hierarchy process for assigning a sensitivity score to each possible value of a sensitive attribute. The reasonability and effectiveness of the proposed approach are verified by using the Adult dataset.

References

    1. 1)
      • 13. Zhu, Z.T.: ‘A generic privacy quantification framework for privacy-preserving data publishing’. PhD thesis, Syracuse, NY, USA, 2010, AAI3437603.
    2. 2)
      • 7. Yang, X.C.: ‘Privacy preserving approaches for multiple sensitive attributes in data publishing’, Chin. J. Comput., 2008, 31, (4), pp. 574587.
    3. 3)
      • 17. Vartanian, A., Shabtai, A.: ‘Tm-score: A misuseability weight measure for textual content’, Trans. Info. For. Sec., 2014, 9, (12), pp. 22052219.
    4. 4)
      • 21. Saaty, T.L.: ‘A scaling method for priorities in hierarchical structures’, J. Math. Psychol., 1977, 15, (3), pp. 234281.
    5. 5)
      • 8. Yuan, Y.B., Yang, J., Zhang, J.P., et al: ‘Evolution of privacy-preserving data publishing’. IEEE Int. Conf. on Anti-Counterfeiting, Security and Identification, Xiamen, China, June 2011, pp. 3437.
    6. 6)
      • 19. Miller, G.A.: ‘The magical number 7, plus or minus 2 - some limits on our capacity for processing information’, Psychological Rev., 1956, 63, (2), pp. 8197.
    7. 7)
      • 10. Ma, Z.D., Kargl, F., Weber, M.: ‘Measuring location privacy in v2x communication systems with accumulated information’. IEEE 6th Int. Conf. on Mobile Adhoc and Sensor Systems, Macau, China, October 2009, pp. 322331.
    8. 8)
      • 9. Jaynes, E.T.: ‘Information theory and statistical mechanics’, Phys. Rev., 1957, 106, (4), pp. 620630.
    9. 9)
      • 11. Ma, Z.D., Kargl, F., Weber, M.: ‘A location privacy metric for v2x communication systems’. Proc. of the 32Nd Int. Conf. on Sarnoff Symp., SARNOFF'09, Piscataway, NJ, USA, 2009, pp. 213218.
    10. 10)
      • 1. Sweeney, L.: ‘k-anonymity: A model for protecting privacy’, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 2002, 10, (05), pp. 557570.
    11. 11)
      • 15. Harel, A., Shabtai, A., Rokach, L., et al: ‘M-score: A misuseability weight measure’, IEEE Trans. Dependable Secur. Comput., 2012, 9, (3), pp. 414428.
    12. 12)
      • 5. Fung, B.C.M., Wang, K., Yu, P.S.: ‘Top-down specialization for information and privacy preservation’. 21st Int. Conf. on Data Engineering (ICDE'05), Tokyo, Japan, April 2005, pp. 205216.
    13. 13)
      • 2. Machanavajjhala, A., Kifer, D., Gehrke, J., et al: ‘l-diversity: privacy beyond k-anonymity’, ACM Trans. Knowl. Discov. Data, 2007, 1, (1), pp. 1417.
    14. 14)
      • 16. Vavilis, S., Petković, M., Zannone, N.: ‘Data leakage quantification’ (Springer Berlin Heidelberg, Berlin, Heidelberg, 2014), pp. 98113.
    15. 15)
      • 3. Li, N.H., Li, T.C., Venkatasubramanian, S.: ‘t-closeness: privacy beyond kanonymity and l-diversity’. IEEE 23rd Int. Conf. on Data Engineering, Istanbul, Turkey, April 2007, pp. 106115.
    16. 16)
      • 20. Saaty, T.L.: ‘How to make a decision: The analytic hierarchy process’, Eur. J. Oper. Res., 1990, 48, (1), pp. 926.
    17. 17)
      • 14. Ma, C.Y.T., Yau, D.K.Y.: ‘On information-theoretic measures for quantifying privacy protection of time-series data’. Proc. of the 10th ACM Symp. on Information, Computer and Communications Security, ASIA CCS ‘15, ACM, New York, NY, USA, 2015, pp. 427438.
    18. 18)
      • 18. Adult dataset. http://archive.ics.uci.edu/ml/machine-learning-databases/adult/.
    19. 19)
      • 22. Shannon, C.E.: ‘A mathematical theory of communication’, Bell Syst. Tech. J., 1948, 27, (3), pp. 379423.
    20. 20)
      • 12. Du, W.L., Teng, Z.X., Zhu, Z.T.: ‘Privacy-maxent: integrating background knowledge in privacy quantification’. Proc. of the 2008 ACM SIGMOD Int. Conf. on Management of Data, SIGMOD ‘08, ACM, New York, NY, USA, 2008, pp. 459472.
    21. 21)
      • 4. Xiao, X.K., Tao, Y.F.: ‘m-invariance: towards privacy preserving re-publication of dynamic datasets’. Proc. of the 2007 ACM SIGMOD Int. Conf. on Management of Data, SIGMOD ‘07, ACM, Beijing, China, 2007, pp. 689700.
    22. 22)
      • 6. Xiao, X.K., Tao, Y.F.: ‘Anatomy: simple and effective privacy preservation’. Proc. of the 32Nd Int. Conf. on Very Large Data Bases, VLDB ‘06, VLDB Endowment, Seoul, Korea, 2006, pp. 139150.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2017.0341
Loading

Related content

content/journals/10.1049/iet-ifs.2017.0341
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address