Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY

k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY <jats:p> Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful? The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment. A release provides k-anonymity protection if the information for each person contained in the release cannot be distinguished from at least k-1 individuals whose information also appears in the release. This paper also examines re-identification attacks that can be realized on releases that adhere to k-anonymity unless accompanying policies are respected. The k-anonymity protection model is important because it forms the basis on which the real-world systems known as Datafly, μ-Argus and k-Similar provide guarantees of privacy protection. </jats:p> http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems CrossRef

k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY

International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems , Volume 10 (05): 557-570 – Oct 1, 2002

k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY


Abstract

<jats:p> Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful? The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment. A release provides k-anonymity protection if the information for each person contained in the release cannot be distinguished from at least k-1 individuals whose information also appears in the release. This paper also examines re-identification attacks that can be realized on releases that adhere to k-anonymity unless accompanying policies are respected. The k-anonymity protection model is important because it forms the basis on which the real-world systems known as Datafly, μ-Argus and k-Similar provide guarantees of privacy protection. </jats:p>

Loading next page...
 
/lp/crossref/k-anonymity-a-model-for-protecting-privacy-Mskh1B8UIE

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
CrossRef
ISSN
0218-4885
DOI
10.1142/s0218488502001648
Publisher site
See Article on Publisher Site

Abstract

<jats:p> Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful? The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment. A release provides k-anonymity protection if the information for each person contained in the release cannot be distinguished from at least k-1 individuals whose information also appears in the release. This paper also examines re-identification attacks that can be realized on releases that adhere to k-anonymity unless accompanying policies are respected. The k-anonymity protection model is important because it forms the basis on which the real-world systems known as Datafly, μ-Argus and k-Similar provide guarantees of privacy protection. </jats:p>

Journal

International Journal of Uncertainty, Fuzziness and Knowledge-Based SystemsCrossRef

Published: Oct 1, 2002

There are no references for this article.