{"title":"How to Find an Appropriate K for K-Anonymization","authors":"S. Kiyomoto, Yutaka Miyake","doi":"10.1109/IMIS.2014.34","DOIUrl":null,"url":null,"abstract":"Personalization has been implemented in a variety of services. k-anonymity is the most common definition for the anonymization of personal data sets, and is considered to be a normal feature of personal data exchanges. However, there is an important issue: How to find an appropriate k for k-anonymity. In this paper, we present a model for finding an appropriate k in k-anonymization. The model suggests that an optimal k exists that is appropriate to the balance between value and risk when personal data are published. This is the first step towards realizing an optimized configuration for publication of personal data.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2014.34","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Personalization has been implemented in a variety of services. k-anonymity is the most common definition for the anonymization of personal data sets, and is considered to be a normal feature of personal data exchanges. However, there is an important issue: How to find an appropriate k for k-anonymity. In this paper, we present a model for finding an appropriate k in k-anonymization. The model suggests that an optimal k exists that is appropriate to the balance between value and risk when personal data are published. This is the first step towards realizing an optimized configuration for publication of personal data.