{"title":"Re-Identification risk in anonymized data sets with parent-child information","authors":"Revekka Kalli, M. Anagnostou","doi":"10.1109/SEEDA-CECNSM53056.2021.9566230","DOIUrl":null,"url":null,"abstract":"We explore the risk of re-identification in anonymized data sets that preserve genealogical information (i.e. parent-child links). We consider attacks based on the number of children of an individual. We use part of a well known data set in our experiments, which show that a substantial part of the population involved in the set can be identified, even if additional anonymity protection measures based on graph trimming are taken. We have also found that the risk quickly increases with generatiou depth.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"27 1","pages":"1-7"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"计算机工程与设计","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566230","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We explore the risk of re-identification in anonymized data sets that preserve genealogical information (i.e. parent-child links). We consider attacks based on the number of children of an individual. We use part of a well known data set in our experiments, which show that a substantial part of the population involved in the set can be identified, even if additional anonymity protection measures based on graph trimming are taken. We have also found that the risk quickly increases with generatiou depth.
期刊介绍:
Computer Engineering and Design is supervised by China Aerospace Science and Industry Corporation and sponsored by the 706th Institute of the Second Academy of China Aerospace Science and Industry Corporation. It was founded in 1980. The purpose of the journal is to disseminate new technologies and promote academic exchanges. Since its inception, it has adhered to the principle of combining depth and breadth, theory and application, and focused on reporting cutting-edge and hot computer technologies. The journal accepts academic papers with innovative and independent academic insights, including papers on fund projects, award-winning research papers, outstanding papers at academic conferences, doctoral and master's theses, etc.