Umeå University's logo

umu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Attribute disclosure risk for k-anonymity: the case of numerical data
Umeå University, Faculty of Science and Technology, Department of Computing Science.ORCID iD: 0000-0002-0368-8037
Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, Bellaterra, Spain.
2023 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 22, no 6, p. 2015-2024Article in journal (Refereed) Published
Abstract [en]

k-Anonymity is one of the most well-known privacy models. Internal and external attacks were discussed for this privacy model, both focusing on categorical data. These attacks can be seen as attribute disclosure for a particular attribute. Then, p-sensitivity and p-diversity were proposed as solutions for these privacy models. That is, as a way to avoid attribute disclosure for this very attribute. In this paper we discuss the case of numerical data, and we show that attribute disclosure can also take place. For this, we use well-known rules to detect sensitive cells in tabular data protection. Our experiments show that k-anonymity is not immune to attribute disclosure in this sense. We have analyzed the results of two different algorithms for achieving k-anonymity. First, MDAV as a way to provide microaggregation and k-anonymity. Second, Mondrian. In fact, to our surprise, the number of cells detected as sensitive is quite significant, and there are no fundamental differences between Mondrian and MDAV. We describe the experiments considered, and the results obtained. We define dominance rule compliant and p%-rule compliant k-anonymity for k-anonymity taking into account attribute disclosure. We conclude with an analysis and directions for future research.

Place, publisher, year, edition, pages
Springer Nature, 2023. Vol. 22, no 6, p. 2015-2024
Keywords [en]
Attribute disclosure, Data protection, k-anonymity, Masking methods, Microaggregation, Reidentification
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:umu:diva-212543DOI: 10.1007/s10207-023-00730-xISI: 001032942300001Scopus ID: 2-s2.0-85165677812OAI: oai:DiVA.org:umu-212543DiVA, id: diva2:1786468
Funder
Knut and Alice Wallenberg FoundationAvailable from: 2023-08-09 Created: 2023-08-09 Last updated: 2023-12-19Bibliographically approved

Open Access in DiVA

fulltext(435 kB)60 downloads
File information
File name FULLTEXT02.pdfFile size 435 kBChecksum SHA-512
8cc795e07f5112487a577affdfd510c67f46995c826f69bfc053adee221318df9e4e58e794d864ac2a13a1f1363f311560fedc923b28609bc11b4b76e16c335f
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Torra, Vicenç

Search in DiVA

By author/editor
Torra, Vicenç
By organisation
Department of Computing Science
In the same journal
International Journal of Information Security
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 111 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 157 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf