Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Normal view MARC view ISBD view

Privacy-preserving data publishing : an overview /

By: Wong, Raymond Chi-Wing.
Contributor(s): Fu, Ada Wai-Chee.
Material type: materialTypeLabelBookSeries: Synthesis lectures on data management: # 3.Publisher: San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool Publishers, c2010Description: 1 electronic text (ix, 128 p. : ill.) : digital file.ISBN: 9781608452170 (electronic bk.).Uniform titles: Synthesis digital library of engineering and computer science. Subject(s): Data protection | Data mining | Database securityDDC classification: 658.478 Online resources: Abstract with links to resource Also available in print.
Contents:
1. Introduction -- Data publishing -- Significance -- Organization --
2. Fundamental concepts -- Anonymization -- Information loss metric -- Privacy models -- Other privacy models -- Conclusion --
3. One-time data publishing -- Knowledge about quasi-identifiers -- Knowledge about the distribution of sensitive values -- Knowledge about the linkage of individuals to sensitive values -- Information that some individuals do not have some sensitive values -- Information that some individuals have some sensitive values -- Knowledge about the relationship among individuals -- Knowledge about anonymization -- Knowledge mined from the microdata -- Knowledge mined from the published data -- How to use published data -- Aggregate queries -- Information loss -- Evaluation with data mining and data analysis tools -- Querying over an uncertain database -- Conclusion --
4. Multiple-time data publishing -- Individual-based correlation -- Data publishing from static microdata -- Data publishing from dynamic microdata -- Sensitive value-based correlation -- Protection for permanent sensitive values -- Protection for transient sensitive values -- Conclusion --
5. Graph data -- Data model -- Adversary attacks -- Assumption of adversary knowledge -- Active attacks -- Utility of the published data -- K-anonymity -- Vertex degree -- 1-neighborhood -- Vertex partitioning -- K-automorphism -- Multiple releases of data graphs -- Other approaches -- Future directions --
6. Other datatypes -- Spatial data -- With anonymizer -- Without anonymizer -- Transactional data -- Conclusion --
7. Future research directions -- One-time data publishing -- Multiple-time data publishing -- Publishing graph data -- Publishing data of other forms --
A. Definition of entropy l-diversity and recursive l-diversity -- Authors' biographies.
Abstract: Privacy preservation has become a major issue in many data analysis applications. When a data set is released to other parties for data analysis, privacy-preserving techniques are often required to reduce the possibility of identifying sensitive information about individuals. For example, in medical data, sensitive information can be the fact that a particular patient suffers from HIV. In spatial data, sensitive information can be a specific location of an individual. In web surfing data, the information that a user browses certain websites may be considered sensitive. Consider a dataset containing some sensitive information is to be released to the public. In order to protect sensitive information, the simplest solution is not to disclose the information. However, this would be an overkill since it will hinder the process of data analysis over the data from which we can find interesting patterns. Moreover, in some applications, the data must be disclosed under the government regulations. Alternatively, the data owner can first modify the data such that the modified data can guarantee privacy and, at the same time, the modified data retains sufficient utility and can be released to other parties safely. This process is usually called as privacy-preserving data publishing. In this monograph, we study how the data owner can modify the data and how the modified data can preserve privacy and protect sensitive information.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
E books E books PK Kelkar Library, IIT Kanpur
Available EBKE248
Total holds: 0

Mode of access: World Wide Web.

System requirements: Adobe Acrobat reader.

Part of: Synthesis digital library of engineering and computer science.

Series from website.

Includes bibliographical references (p. 119-125).

1. Introduction -- Data publishing -- Significance -- Organization --

2. Fundamental concepts -- Anonymization -- Information loss metric -- Privacy models -- Other privacy models -- Conclusion --

3. One-time data publishing -- Knowledge about quasi-identifiers -- Knowledge about the distribution of sensitive values -- Knowledge about the linkage of individuals to sensitive values -- Information that some individuals do not have some sensitive values -- Information that some individuals have some sensitive values -- Knowledge about the relationship among individuals -- Knowledge about anonymization -- Knowledge mined from the microdata -- Knowledge mined from the published data -- How to use published data -- Aggregate queries -- Information loss -- Evaluation with data mining and data analysis tools -- Querying over an uncertain database -- Conclusion --

4. Multiple-time data publishing -- Individual-based correlation -- Data publishing from static microdata -- Data publishing from dynamic microdata -- Sensitive value-based correlation -- Protection for permanent sensitive values -- Protection for transient sensitive values -- Conclusion --

5. Graph data -- Data model -- Adversary attacks -- Assumption of adversary knowledge -- Active attacks -- Utility of the published data -- K-anonymity -- Vertex degree -- 1-neighborhood -- Vertex partitioning -- K-automorphism -- Multiple releases of data graphs -- Other approaches -- Future directions --

6. Other datatypes -- Spatial data -- With anonymizer -- Without anonymizer -- Transactional data -- Conclusion --

7. Future research directions -- One-time data publishing -- Multiple-time data publishing -- Publishing graph data -- Publishing data of other forms --

A. Definition of entropy l-diversity and recursive l-diversity -- Authors' biographies.

Abstract freely available; full-text restricted to subscribers or individual document purchasers.

Compendex

INSPEC

Google scholar

Google book search

Privacy preservation has become a major issue in many data analysis applications. When a data set is released to other parties for data analysis, privacy-preserving techniques are often required to reduce the possibility of identifying sensitive information about individuals. For example, in medical data, sensitive information can be the fact that a particular patient suffers from HIV. In spatial data, sensitive information can be a specific location of an individual. In web surfing data, the information that a user browses certain websites may be considered sensitive. Consider a dataset containing some sensitive information is to be released to the public. In order to protect sensitive information, the simplest solution is not to disclose the information. However, this would be an overkill since it will hinder the process of data analysis over the data from which we can find interesting patterns. Moreover, in some applications, the data must be disclosed under the government regulations. Alternatively, the data owner can first modify the data such that the modified data can guarantee privacy and, at the same time, the modified data retains sufficient utility and can be released to other parties safely. This process is usually called as privacy-preserving data publishing. In this monograph, we study how the data owner can modify the data and how the modified data can preserve privacy and protect sensitive information.

Also available in print.

Title from PDF t.p. (viewed on March 7, 2010).

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha