Skip to main content

Can the utility of anonymized data be used for privacy breaches?

Publication ,  Journal Article
Wong, RCW; Fu, AWC; Wang, K; Yu, PS; Pei, J
Published in: ACM Transactions on Knowledge Discovery from Data
August 1, 2011

Group based anonymization is the most widely studied approach for privacy-preserving data publishing. Privacy models/definitions using group based anonymization includes k-anonymity, ℓ-diversity, and t-closeness, to name a few. The goal of this article is to raise a fundamental issue regarding the privacy exposure of the approaches using group based anonymization. This has been overlooked in the past. The group based anonymization approach by bucketization basically hides each individual record behind a group to preserve data privacy. If not properly anonymized, patterns can actually be derived from the published data and be used by an adversary to breach individual privacy. For example, from the medical records released, if patterns such as that people from certain countries rarely suffer from some disease can be derived, then the information can be used to imply linkage of other people in an anonymized group with this disease with higher likelihood. We call the derived patterns from the published data the foreground knowledge. This is in contrast to the background knowledge that the adversary may obtain from other channels, as studied in some previous work. Finally, our experimental results show such an attack is realistic in the privacy benchmark dataset under the traditional group based anonymization approach. © 2011 ACM.

Duke Scholars

Published In

ACM Transactions on Knowledge Discovery from Data

DOI

EISSN

1556-472X

ISSN

1556-4681

Publication Date

August 1, 2011

Volume

5

Issue

3

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 4606 Distributed computing and systems software
  • 4605 Data management and data science
  • 4604 Cybersecurity and privacy
  • 0806 Information Systems
  • 0801 Artificial Intelligence and Image Processing
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wong, R. C. W., Fu, A. W. C., Wang, K., Yu, P. S., & Pei, J. (2011). Can the utility of anonymized data be used for privacy breaches? ACM Transactions on Knowledge Discovery from Data, 5(3). https://doi.org/10.1145/1993077.1993080
Wong, R. C. W., A. W. C. Fu, K. Wang, P. S. Yu, and J. Pei. “Can the utility of anonymized data be used for privacy breaches?ACM Transactions on Knowledge Discovery from Data 5, no. 3 (August 1, 2011). https://doi.org/10.1145/1993077.1993080.
Wong RCW, Fu AWC, Wang K, Yu PS, Pei J. Can the utility of anonymized data be used for privacy breaches? ACM Transactions on Knowledge Discovery from Data. 2011 Aug 1;5(3).
Wong, R. C. W., et al. “Can the utility of anonymized data be used for privacy breaches?ACM Transactions on Knowledge Discovery from Data, vol. 5, no. 3, Aug. 2011. Scopus, doi:10.1145/1993077.1993080.
Wong RCW, Fu AWC, Wang K, Yu PS, Pei J. Can the utility of anonymized data be used for privacy breaches? ACM Transactions on Knowledge Discovery from Data. 2011 Aug 1;5(3).

Published In

ACM Transactions on Knowledge Discovery from Data

DOI

EISSN

1556-472X

ISSN

1556-4681

Publication Date

August 1, 2011

Volume

5

Issue

3

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 4606 Distributed computing and systems software
  • 4605 Data management and data science
  • 4604 Cybersecurity and privacy
  • 0806 Information Systems
  • 0801 Artificial Intelligence and Image Processing