(k,ε)-Anonymity: k-Anonymity with ε-Differential Privacy

10/04/2017
by   Naoise Holohan, et al.
0

The explosion in volume and variety of data offers enormous potential for research and commercial use. Increased availability of personal data is of particular interest in enabling highly customised services tuned to individual needs. Preserving the privacy of individuals against reidentification attacks in this fast-moving ecosystem poses significant challenges for a one-size fits all approach to anonymisation. In this paper we present (k,ϵ)-anonymisation, an approach that combines the k-anonymisation and ϵ-differential privacy models into a single coherent framework, providing privacy guarantees at least as strong as those offered by the individual models. Linking risks of less than 5% are observed in experimental results, even with modest values of k and ϵ. Our approach is shown to address well-known limitations of k-anonymity and ϵ-differential privacy and is validated in an extensive experimental campaign using openly available datasets.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/25/2023

Private Meeting Summarization Without Performance Loss

Meeting summarization has an enormous business potential, but in additio...
research
09/06/2018

Issues Encountered Deploying Differential Privacy

When differential privacy was created more than a decade ago, the motiva...
research
01/21/2019

Differential Privacy for Power Grid Obfuscation

The availability of high-fidelity energy networks brings significant val...
research
09/02/2023

A Survey of Local Differential Privacy and Its Variants

The introduction and advancements in Local Differential Privacy (LDP) va...
research
06/28/2020

Differential Privacy of Hierarchical Census Data: An Optimization Approach

This paper is motivated by applications of a Census Bureau interested in...
research
02/17/2021

Differential Privacy for Government Agencies – Are We There Yet?

Government agencies always need to carefully consider potential risks of...
research
10/18/2020

Decentralized and Secure Generation Maintenance with Differential Privacy

Decentralized methods are gaining popularity for data-driven models in p...

Please sign up or login with your details

Forgot password? Click here to reset