A COMPARATIVE STUDY OF VARIOUS MDAV ALGORITHMS

Authors

  • Gajendra Singh Rawat,Dr. Bhogeshwar Borah

Keywords:

Statiscal Disclosure Control, Information Loss, Disclosure Risk, microdata, anonymity, microaggregation

Abstract

Microaggregation is an efficient Statistical Disclosure Control (SDC) perturbative technique for microdata protection. It is a unified approach and naturally satisfies k-Anonymity without generalization or suppression of data. Various microaggregation techniques: fixed-size and data-oriented for univariate and multivariate data exists in the literature. These methods have been evaluated using the standard measures: Disclosure Risk (DR) and Information Loss (IL). Every time a new microaggregation technique was proposed, a better trade-off between risk of disclosing data and data utility was achieved. Though there exists an optimal univariate microaggregation method but unfortunately an optimal multivariate microaggregation method is an NP hard problem. Consequently, several heuristics have been proposed but no such method outperforms the other in all the possible criteria. In this paper we have performed a study of the various microaggregation techniques so that we get a detailed insight on how to design an efficient microaggregation method which satisfies all the criteria.

References

Agrawal R., Srikant “R. Privacy-Preserving Data Mining”. ACM SIGMOD Conference, 2000.

CHARU C. AGGARWAL and PHILIP S. YU “PRIVACY-PRESERVING DATA MINING:MODELS AND ALGORITHMS”

Sweeney L.: Replacing Personally Identifiable Information in Medical Records, the Scrub System. Journal of the American Medical Informatics Association, 1996.

Sweeney L.: Guaranteeing Anonymity while Sharing Data, the Datafly System. Journal of the American Medical Informatics Association,1997.

J.M. Mateo-Sanz and J. Domingo-Ferrer, “A Method for Data Oriented Multivariate Microaggregation,” Proc. Statistical Data Protection ’98.pp. 89-99,1999.

A. Hundepool, A. V. deWetering, R. Ramaswamy, L. Franconi, A. Capobianchi, P.-P. DeWolf, J.Domingo-Ferrer, V. Torra, R. Brand & S. Giessing, (2003) “μ-ARGUS version 3.2 Software and User’s Manual”, Voorburg NL: Statistics Netherlands, http://neon.vb.cbs.nl/casc.

M. Laszlo & S. Mukherjee, (2005) “Minimum spanning tree partitioning algorithm for microaggregation”, IEEE Transactions on Knowledge and Data Engineering, 17(7), pp. 902-911.

Domingo-Ferrer J, Mateo-Sanz J., Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering 2002; 14(1):189–201

Malin B., Sweeney L.: Determining the identifiability of DNA database entries. Journal of the American Medical Informatics Association, pp. 537–541, November 2000

Laszlo, M., Mukherjee, S.: Minimum spanning tree partitioning algorithm for microaggregation. IEEETrans. Knowl. Data Eng. 17(7), 902–911 (2005)

J. Domingo-Ferrer and V. Torra, “Ordinal, continuous and heterogeneous k-anonymity through microaggregation,” Data Mining and Knowledge Discovery, vol. 11, no. 2, pp. 195–212, 2005.

A. Solanas & A. Mart’inez-Ballest’e, (2006) “V-MDAV: A multivariate microaggregation with variable group size”, Seventh COMPSTAT Symposium of the IASC, Rome.

J. Domingo-Ferrer, A. Solanas & A. Mat´ınez-Ballest´e, 2006 “Privacy in statistical databases: kanonymity through microaggregation”, in IEEE Granular Computing' 06. Atlanta. USA, pp. 774-777. 118 Computer Science & Information Technology (CS & IT).

Newton E., Sweeney L.,Malin B.: Preserving Privacy by De-identifying Facial Images. IEEE Transactions on Knowledge and Data Engineering, IEEE TKDE, February 2005.

A. Hundepool, A. V. deWetering, R. Ramaswamy, L. Franconi, A. Capobianchi, P.-P. DeWolf, J. Domingo-Ferrer, V. Torra, R. Brand, and S. Giessing. μ-ARGUS version 4.0 Software and User’s Manual. Voorburg NL: Statistics Netherlands, May 2005, http://neon.vb.cbs.nl/casc.

Sweeney L.: Privacy-Preserving Bio-terrorism Surveillance. AAAI Spring Symposium, AI Technologies for Homeland Security, 2005

Sweeney L.: Privacy Technologies for Homeland Security. Testimony before the Privacy and Integrity Advisory Committee of the Department of Homeland Security, Boston, MA, June 15, 2005

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam “l-diversity: Privacy beyond k-anonymity”, In Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), 2006

Solanas A., Mart’ınez-Ballest´e A. V-MDAV: A multivariate microaggregation with variable group size. Seventh COMPSTAT Symposium of the IASC, Rome, 2006

Sweeney L.: AI Technologies to Defeat Identity Theft Vulnerabilities. AAAI Spring Symposium, AI Technologies for Homeland Security, 2005

Benjamin C. M. Fung Concordia University, Montreal, Rui Chen Simon Fraser University, Burnaby and Philip S. Yu University of Illinois at Chicago “Privacy-Preserving Data Publishing: A Survey of Recent Developments” ACM Computing Surveys, Vol. 42, No. 4, Article 14, Publication date: June 2010

Privacy-Preserving Data Mining, Models and Algorithms Edited by Charu C. Aggarwal IBM T.J. Watson Research Center, USA and Philip S. Yu University of Illinois at Chicago, USA, Springer 2008

Ebaa Fayyoumi and B. John Oommen “ A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases.” Softw. Pract. Exper. 31 May 2010.

P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, CMU, SRI, 1998.

Josep domingo-Ferrer, Agusti Solanas. “Privacy in Statistical Databases:k-Anonymity Through Microaggregation,” IEEE 2006

Domingo-Ferrer, J., Sebé, F., & Solanas, A. (2008). A polynomial-time approximation to optimal multivariate microaggregation. Computer and Mathematics with Applications, 55(4), 714–732.

Chang, C.-C., Li, Y.-C., & Huang, W.-H. (2007). TRFP: An efficient microaggregation algorithm for statistical disclosure control. Journal of Systems and Software, 80(11), 1866–1878.

Ebaa Fayyoumi and B. John Oommen “A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases” Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/spe.992

Sweeney L., Gross R.: Mining Images in Publicly-Available Cameras for Homeland Security. AAAI Spring Symposium, AI Technologies for Homeland Security, 2005.

Domingo-Ferrer, J., Martínez-Ballesté, A., Mateo-Sanz, J. M., & Sebé, F. Efficient multivariate data-oriented microaggregation. The VLDB Journal, 15(4), 355–369. (2006)

Downloads

How to Cite

Gajendra Singh Rawat,Dr. Bhogeshwar Borah. (2013). A COMPARATIVE STUDY OF VARIOUS MDAV ALGORITHMS. International Journal of Research & Technology, 1(2), 45–53. Retrieved from https://ijrt.org/j/article/view/16

Issue

Section

Original Research Articles

Similar Articles

<< < 1 2 3 4 5 6 

You may also start an advanced similarity search for this article.