On Computational Anonymity

The concern of data privacy is to mask data so that they can be transferred to untrusted third parties without leaking confidential individual information. In this work we distinguish between theoretical anonymity and computational anonymity. We present a relaxation of k-anonymity, called (k,l)-anonymity, which makes sense when it can be assumed that the knowledge of an adversary is limited. (k,l)-Anonymity can also be regarded as a quantification of the anonymity in terms of the adversary's limitations. Combinatorics, or more precisely, hypergraphs, are used to represent the anonymity relations in a (k,l)-anonymous table. Finally, we present an algorithm for the (k,l)-anonymization of tables.

[1]  K. Stokes Combinatorial structures for anonymous database search , 2011 .

[2]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[3]  Vicenç Torra,et al.  Reidentification and k-anonymity: a model for disclosure risk in graphs , 2012, Soft Comput..

[4]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[5]  Josep Domingo-Ferrer,et al.  Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation , 2005, Data Mining and Knowledge Discovery.

[6]  Josep Domingo-Ferrer,et al.  User-private information retrieval based on a peer-to-peer community , 2009, Data Knowl. Eng..

[7]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[8]  U. M. Feyyad Data mining and knowledge discovery: making sense out of data , 1996 .

[9]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[10]  Marie-Francine Moens,et al.  Finding a needle in a haystack: an interactive video archive explorer for professional video searchers , 2011, Multimedia Tools and Applications.

[11]  B. Bollobás Combinatorics: Set Systems, Hypergraphs, Families of Vectors and Combinatorial Probability , 1986 .

[12]  Pere Joan Ravetllat Mira,et al.  Universitat Rovira i Virgili , 2013 .

[13]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.