n-confusion: a generalization of k-anonymity

We provide a formal framework for re-identification in general. We define n-confusion as a concept for modelling the anonymity of a database table and we prove that n-confusion is a generalization of k-anonymity. Finally we present an example to illustrate how this result can be used to augment local variance in k-anonymous protected data.

[1]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[2]  Robert Lowen,et al.  Distances between fuzzy sets representing grey level images , 1998, Fuzzy Sets Syst..

[3]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[4]  David J. DeWitt,et al.  Mondrian Multidimensional K-Anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[5]  David J. DeWitt,et al.  Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.

[6]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[7]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[8]  Tamir Tassa,et al.  k-Anonymization Revisited , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[9]  U. Rovira,et al.  Chapter 6 A Quantitative Comparison of Disclosure Control Methods for Microdata , 2001 .

[10]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[11]  Josep Domingo-Ferrer,et al.  A measure of variance for hierarchical nominal attributes , 2008, Inf. Sci..

[12]  A. Chateauneuf Combination of compatible belief functions and relation of specificity , 1992 .

[13]  Isabelle Bloch,et al.  On fuzzy distances and their use in image processing under imprecision , 1999, Pattern Recognit..

[14]  George J. Klir,et al.  Fuzzy sets and fuzzy logic - theory and applications , 1995 .

[15]  Philippe Smets,et al.  The Transferable Belief Model , 1991, Artif. Intell..

[16]  Josep Domingo-Ferrer,et al.  Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation , 2005, Data Mining and Knowledge Discovery.

[17]  Qunrui Ye,et al.  Finding a needle in a haystack , 2013, Oncoimmunology.

[18]  William E. Winkler,et al.  Re-identification Methods for Masked Microdata , 2004, Privacy in Statistical Databases.