The proliferation of information on the Internet and access to fast computers with large storage capacities has increased the volume of information collected and disseminated about individuals. The existence os these other data sources makes it much easier to re-identify individuals whose private information is released in data believed to be anonymous. At the same time, increasing demands are made on organizations to release individualized data rather than aggregate statistical information. Even when explicit identi ers, such as name and phone number, are removed or encrypted when releasing individualized data, other characteristic data, which we term quasi-identi ers, can exist which allow the data recipient to re-identify individuals to whom the data refer. In this paper, we provide a computational disclosure technique for releasing information from a private table such that the identity of any individual to whom the released data refer cannot be de nitively recognized. Our approach protects against linking to other data. It is based on the concepts of generalization, by which stored values can be replaced with semantically consistent and truthful but less precise alternatives, and of k-anonymity . A table is said to provide k-anonymity when the contained data do not allow the recipient to associate the released information to a set of individuals smaller than k. We introduce the notions of generalized table and of minimal generalization of a table with respect to a k-anonymity requirement. As an optimization problem, the objective is to minimally distort the data while providing adequate protection. We describe an algorithm that, given a table, e ciently computes a preferred minimal generalization to provide anonymity.
[1]
Latanya Sweeney,et al.
Guaranteeing anonymity when sharing medical data, the Datafly System
,
1997,
AMIA.
[2]
Tian Zhang,et al.
BIRCH: an efficient data clustering method for very large databases
,
1996,
SIGMOD '96.
[3]
Alexander Borgida,et al.
Efficient management of transitive relationships in large data and knowledge bases
,
1989,
SIGMOD '89.
[4]
Pai-Cheng Chu,et al.
Cell Suppression Methodology: The Importance of Suppressing Marginal Totals
,
1997,
IEEE Trans. Knowl. Data Eng..
[5]
Elisa Bertino,et al.
A Uniied Framework for Enforcing Multiple Access Control Policies
,
1997
.
[6]
L Sweeney,et al.
Weaving Technology and Policy Together to Maintain Confidentiality
,
1997,
Journal of Law, Medicine & Ethics.
[7]
Nabil R. Adam,et al.
Security-control methods for statistical databases: a comparative study
,
1989,
ACM Comput. Surv..
[8]
Peter J. Denning,et al.
The tracker: a threat to statistical database security
,
1979,
TODS.
[9]
Brian A. Davey,et al.
An Introduction to Lattices and Order
,
1989
.