Sciweavers

ACSC
2008
IEEE

An efficient hash-based algorithm for minimal k-anonymity

13 years 6 months ago
An efficient hash-based algorithm for minimal k-anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes of microdata that clearly identify individuals, such as name and medical care card number, are generally removed, these databases can sometimes be joined with other public databases on attributes such as Zip code, Gender and Age to reidentify individuals who were supposed to remain anonymous. "Linking" attacks are made easier by the availability of other complementary databases over the Internet. k-anonymity is a technique that prevents "linking" attacks by generalizing and/or suppressing portions of the released microdata so that no individual can be uniquely distinguished from a group of size k. In this paper, we investigate a practical model of kanonymity, called full-domain generalization. We examine the issue of computing minimal k-anonymous table based on the definition of minimality described by Samarati. We introduce the hash-based te...
Xiaoxun Sun, Min Li, Hua Wang, Ashley W. Plank
Added 12 Oct 2010
Updated 12 Oct 2010
Type Conference
Year 2008
Where ACSC
Authors Xiaoxun Sun, Min Li, Hua Wang, Ashley W. Plank
Comments (0)