{"title":"Enhancing Privacy of Released Database","authors":"Tingting Chen, S. Zhong","doi":"10.1109/GrC.2007.101","DOIUrl":null,"url":null,"abstract":"With advanced information techniques, organizations want to make their database public for different purposes. It is important to do some data transformations that prevent private information to be revealed before publishing the database. In this paper, we introduce a combined approach to enhance the privacy of the databases to be released. The combination of two existing techniques, k-anonymity and randomization, provides better privacy protection than only applying one of two approaches and still reserves certain data utility. The experiments on real-world dataset show that our privacy breach prevention algorithm enhances the privacy with small cost increase compared to the k-anonymity approach.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Conference on Granular Computing (GRC 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GrC.2007.101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
With advanced information techniques, organizations want to make their database public for different purposes. It is important to do some data transformations that prevent private information to be revealed before publishing the database. In this paper, we introduce a combined approach to enhance the privacy of the databases to be released. The combination of two existing techniques, k-anonymity and randomization, provides better privacy protection than only applying one of two approaches and still reserves certain data utility. The experiments on real-world dataset show that our privacy breach prevention algorithm enhances the privacy with small cost increase compared to the k-anonymity approach.