m-Privacy for Collaborative Data Publishing

被引:25
作者
Goryczka, Slawomir [1 ]
Xiong, Li [1 ]
Fung, Benjamin C. M. [2 ]
机构
[1] Emory Univ, Dept Math & Comp Sci, Atlanta, GA 30322 USA
[2] McGill Univ, Montreal, PQ H3A 1X1, Canada
基金
美国国家科学基金会;
关键词
Privacy; security; integrity and protection; distributed databases; SECURE; MODEL;
D O I
10.1109/TKDE.2013.18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we consider the collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. We consider a new type of "insider attack" by colluding data providers who may use their own data records (a subset of the overall data) to infer the data records contributed by other data providers. The paper addresses this new threat, and makes several contributions. First, we introduce the notion of m-privacy, which guarantees that the anonymized data satisfies a given privacy constraint against any group of up to m colluding data providers. Second, we present heuristic algorithms exploiting the monotonicity of privacy constraints for efficiently checking m-privacy given a group of records. Third, we present a data provider-aware anonymization algorithm with adaptive m-privacy checking strategies to ensure high utility and m-privacy of anonymized data with efficiency. Finally, we propose secure multi-party computation protocols for collaborative data publishing with m-privacy. All protocols are extensively analyzed and their security and efficiency are formally proved. Experiments on real-life datasets suggest that our approach achieves better or comparable utility and efficiency than existing and baseline algorithms while satisfying m-privacy.
引用
收藏
页码:2520 / 2533
页数:14
相关论文
共 39 条
[1]  
Aggarwal G, 2004, LECT NOTES COMPUT SC, V3027, P40
[2]  
[Anonymous], 2006, P 32 INT C VER LARG
[3]  
[Anonymous], 2010, P 19 INT C COMPUTER
[4]  
[Anonymous], 2002, ACM Sigkdd Explorations Newsletter, DOI [10.1145/772862.772867, DOI 10.1145/772862.772867]
[5]  
[Anonymous], P 19 ANN IFIP WG 11
[6]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[7]  
BOROS G., 2004, IRRESISTIBLE INTEGRA
[8]  
Bucil Cristian., 2002, Proceedings of the eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD'02, P42
[9]  
Burke R., 2005, P PERS WORKSH NEXT G
[10]  
Burkhart M., 2010, P 19 USENIX SEC BERK