Group Anonymity: Problems and Solutions

2010;
: сс. 3 - 15
Authors: 

Chertov O., Tavrov D.

National Technical University of Ukraine "Kyiv Politechnic Institute", Applied Mathematics Department

Existing methods of providing data anonymity preserve individual privacy, but, the task of protecting respondent groups' information in publicly available datasets remains open. Group anonymity lies in hiding (masking) data patterns that cannot be revealed by analyzing individual records. We discuss main corresponding problems, and provide methods for solving each one

1. As the economy contracts, the digital universe expands [Електронний ресурс] / J. Gantz, D. Reinsel // IDC multimedia white paper, 2009. — Режим доступу: http://www.emc. com/collateral/demos/microsites/idc-digitaluniverse/iview.htm. 2. U.S. Census 2000. 5-Percent Public Use Microdata Sample Files [Електронний ресурс] / U.S. Census Bureau. — Режим доступу: http://www.census.gov/Press-Release/www/2003/PUMS5.html. 3. Minnesota Population Center. Integrated Public Use Microdata Series International [Електронний ресурс] / IPUMS. — Режим доступу: https://international.ipums.org/international/. 4. Health Insurance Portability and Accountability Act of 1996 (HIPAA): Aug. 21, 1996 / 104th Congress. — Public Law 104-191. — Режим доступу: http://www.hipaa.org/. 5. Patient Safety and Quality Improvement Act of 2005 (PSQIA) / Federal Register. — 2001 — 73(266). 6. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002: Jul. 31, 2002 / Official Journal of the European Communities. — 2002 — L 201. 7. Закон України "Про державну статистику": станом на 5 бер. 2009. — Режим доступу: http://zakon1.rada.gov.ua/cgi-bin/laws/main.cgi?nreg=2614-12\&p=1265575855780241. 8. A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, Version v0.32 [Електронний ресурс] / A. Pfitzmann, M. Hansen, 2009. — Режим доступу: http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml. 9. Toth G. Measuring Anonymity Revisited / G. Toth, Z. Hornak, F. Vajda // Proceedings of the 9th Nordic Workshop on Secure IT Systems. — Espoo, 2004. — P. 85–90. 10. Sweeney L. Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression / L. Sweeney, P. Samarati // IEEE Symposium on Research in Security and Privacy. — IEEE Computer Society Press, 1998. — P. 86–99. 11. Reiter M. K. Crowds: Anonymity for Web Transactions / M. K. Reiter, A. D. Rubin // ACM Transactions on Information and System Security. — ACM Press, 1998. — 1(1). — P. 66–92. 12. Halpern J. Y. Anonymity and Information Hiding in Multiagent Systems / J. Y. Halpern, K. R. O'Neill // The 16th IEEE Computer Security Foundations Workshop. — IEEE Computer Society Press, 2003. — P. 75–88. 13. Marx G. T. What's in a Name? Some Reflections on the Sociology of Anonymity / G. T. Marx // The Information Society. — Taylor & Francis, 1999. — 15(2). — P. 99-112. 14. Domingo-Ferrer J. A Survey of Inference Control Methods for Privacy-Preserving Data Mining / J. Domingo-Ferrer // Privacy-Preserving Data Mining: Models and Algorithms. — Springer, 2008. — P. 53–80. 15. Agrawal R. Privacy-Preserving Data Mining / R. Agrawal, R. Srikant // ACM SIGMOD International Conference on Management of Data. — ACM Press, 2000. — P. 439-450. 16. Lindell Y. Privacy Preserving Data Mining / Y. Lindell, B. Pinkas // Advances in Cryptology Crypto 2000. — Berlin: Springer, 2000. — Vol. 1880. — P. 36–53. 17. Willenborg L. Elements of Statistical Disclosure Control / L. Willenborg, T. DeWaal. — New York: Springer-Verlag, 2001. — 261 p. 18. Fienberg S. Data Swapping: Variations on a Theme by Dalenius and Reiss / S. Fienberg, J. McIntyre // Journal of Official Statistics. — Stockholm: Almqvist & Wiksell International, 2005. — Vol. 21(2). — P. 309–324. 19. Domingo-Ferrer J. Practical Data-oriented Microaggregation for Statistical Disclosure Control / J. Domingo-Ferrer, J. M. Mateo-Sanz // IEEE Transactions on Knowledge and Data Engineering. — IEEE Computer Society Press, 2002. — 14(1). — P. 189-201. 20. Evfimievski A. Randomization in Privacy Preserving Data Mining / A. Evfimievski // ACM SIGKDD Explorations Newsletter. — ACM Press, 2002. — 4(2). — P. 43–48. 21. Sweeney L. kanonymity: a Model for Protecting Privacy / L. Sweeney // International Journal on Uncertainty, Fuzziness and Knowledge-based Systems. — World Scientific, 2002. — 10(5). — P. 557–570. 22. Bhargava M. Probabilistic Anonymity / M. Bhargava, C. Palamidessi // CONCUR 2005 – Concurrency Theory. — Berlin/Heidelberg : Springer, 2005. — Vol. 3653. — P. 171–185. 23. Xu S. Singular Value Decomposition Based Data Distortion Strategy for Privacy Protection / S. Xu, J. Zhang, D. Han, J. Wang // Knowledge and Information Systems. — Springer, 2006. — 10(3). — P. 383–397. 24. Wang J. NNMF-based Factorization Techniques for High-Accuracy Privacy Protection on Non-Negative-Valued Datasets / J. Wang, W.J. Zhong, J. Zhang // The 6th IEEE Conference on Data Mining, International Workshop on Privacy Aspects of Data Mining. — IEEE Computer Society Press, 2006. — P. 513–517. 25. Mukherjee S. A Privacy Preserving Technique for Euclidean Distance-based Mining Algorithms Using Fourier-related Transforms / S. Mukherjee, Z. Chen, A. Gangopadhyay // The VLDB Journal. — Springer-Verlag, 2006. — 15(4). — P. 293–315. 26. Bapna S. A Wavelet-based Approach to Preserve Privacy for Classification Mining / S. Bapna, A. Gangopadhyay // Decision Sciences Journal. — Wiley-Blackwell, 2006. — 37(4). — P. 623–642. 27. Liu L. Wavelet-based Data Perturbation for Simultaneous Privacy-Preserving and Statistics-Preserving / L. Liu, J. Wang, J. Zhang // 2008 IEEE International Conference on Data Mining Workshops. — IEEE Computer Society Press, 2008. — P. 27–35. 28. Chertov O. Statistical Disclosure Control Methods for Microdata / O. Chertov, A. Pilipyuk // International Symposium on Computing, Communication and Control. — Singapore: IACSIT, 2009. — P. 338–342. 29. Давыдов А. А. Вейвлет-анализ социальных процессов / А. А. Давыдов // Социологические исследования. — 2003. — №11. — С. 89–101. 30. Mallat S. A Wavelet Tour of Signal Processing / S. Mallat. — New York: Academic Press, 1999. — 620 p. 31. Strang G. Wavelet and Filter Banks / G. Strang, T. Nguyen. — Wellesley: Wellesley- Cambridge Press, 1997. — 520 p.