Privacy and Anonymity in Information Management Systems - New Techniques for New Practical Problems

von: Jordi Nin, Javier Herranz

Springer-Verlag, 2010

ISBN: 9781849962384 , 198 Seiten

Format: PDF, OL

Kopierschutz: Wasserzeichen

Windows PC,Mac OSX für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Windows PC,Mac OSX,Linux

Preis: 149,79 EUR

Mehr zum Inhalt

Privacy and Anonymity in Information Management Systems - New Techniques for New Practical Problems


 

Foreword

6

Acknowledgments

8

Contents

9

Contributors

11

Part I Overview

13

1 Introduction to Privacy and Anonymity in Information Management Systems

14

1.1 Background and Motivation

14

1.2 Organization of the Book

15

1.2.1 Part II: Theory of SDC

15

1.2.2 Part III: Preserving Privacy in Distributed Applications

16

2 Advanced Privacy-Preserving Data Managementand Analysis

18

2.1 Introduction

18

2.2 Managing Anonymized Data

20

2.2.1 Randomization-Based Anonymization Techniques

20

2.2.2 Aggregation-Based Anonymization Techniques

22

2.3 Managing Time-Varying Anonymized Data

23

2.3.1 Anonymizing Multiple Releases

24

2.3.2 Anonymizing Data Streams

26

2.4 Privacy-Preserving Data Analysis (PPDA)

27

2.4.1 Privacy-Preserving Association Rule Mining

27

2.4.2 Privacy-Preserving Classification

29

2.4.3 Privacy-Preserving Clustering

33

2.5 Conclusions

35

References

36

Part II Theory of SDC

39

3 Practical Applications in Statistical Disclosure ControlUsing R

40

3.1 Microdata Protection Using sdcMicro

40

3.1.1 Software Issues

41

3.1.2 The sdcMicro GUI

41

3.1.3 Anonymization of Categorical Variables

43

3.1.4 Anonymization of Numerical Variables

52

3.1.5 Disclosure Risk

55

3.1.6 Case Study Using Real-World Data

57

3.2 Tabular Data Protection Using sdcTable

59

3.2.1 Frequency and Magnitude Tables

59

3.2.2 Primary Sensitive Cells

60

3.2.3 Secondary Cell Suppression

61

3.2.4 Software Issues

61

3.2.5 Anonymizing Tables Using sdcTable -- A Guided Tour

63

3.2.6 Summary

68

3.3 Summary

68

References

69

4 Disclosure Risk Assessment for Sample Microdata Through Probabilistic Modeling

72

4.1 Introduction

72

4.2 Disclosure Risk Measures and Their Estimation

75

4.2.1 Notation and Definitions

75

4.2.2 Estimating the Disclosure Risk

76

4.2.3 Model Selection and Goodness-of-Fit Criteria

78

4.3 Complex Survey Designs

80

4.4 Measurement Error Models for Disclosure Risk Measures

81

4.5 Variance Estimation for Global Disclosure Risk Measures

83

4.6 Examples of Applications

85

4.6.1 Estimating Disclosure Risk Measures Under No Misclassification

85

4.6.2 Estimating Disclosure Risk Measures Under Misclassification

90

4.6.3 Variance Estimation and Confidence Intervals

93

4.7 Extensions to Probabilistic Modeling for Disclosure Risk Estimation

93

References

97

5 Exploiting Auxiliary Information in the Estimation of Per-Record Risk of Disclosure

99

5.1 Introduction

100

5.2 Risk Measures and Models for Risk Estimation

101

5.2.1 Superpopulation Models for Risk Estimation with Survey Data

102

5.2.2 SPREE-Type Estimators for Cross-Classifications

104

5.3 Simulation Plan and Data

108

5.4 Risk Estimators and Simulation Results

110

5.5 Comments

116

References

118

6 Statistical Disclosure Control in Tabular Data

120

6.1 Introduction

120

6.2 Tabular Data: Types and Modeling

122

6.2.1 Classification of Tables

122

6.2.2 Modeling Tables

124

6.3 Sensitive Cells and Sensitivity Rules

127

6.3.1 The Threshold Rule for Frequency Tables

127

6.3.2 The (n,k) and p% Rules for Magnitude Tables

127

6.4 Tabular Data Protection Methods

129

6.4.1 Recoding

129

6.4.2 Cell Suppression

130

6.4.3 Controlled Rounding

133

6.4.4 Controlled Tabular Adjustment

134

6.5 Conclusions

136

References

136

Part III Preserving Privacy in Distributed Applications

139

7 From Collaborative to Privacy-Preserving SequentialPattern Mining

140

7.1 Introduction

140

7.2 Problem Statement

142

7.2.1 Mining of Sequential Patterns

142

7.2.2 From Collaborative to Privacy-Preserving Sequential Pattern Mining

144

7.3 The PRIPSEP Approach

145

7.3.1 Collaborative Sequential Pattern Mining

146

7.3.2 From Collaborative to Privacy-Preserving Sequential Pattern Mining

148

7.3.3 Improving the Robustness of the System

157

7.4 Conclusion

158

References

159

8 Pseudonymized Data Sharing

162

8.1 Introduction

162

8.1.1 Security Properties

163

8.1.2 Relevance

165

8.1.3 Related Work

165

8.2 Description of a Pseudonymized Data Sharing System

165

8.2.1 Syntax

166

8.2.2 Security Requirements

167

8.2.3 Notation

167

8.3 Basic Tools

169

8.3.1 Symmetric Encryption with Semantic Security

169

8.3.2 Decisional Diffie--Hellman Assumption

170

8.3.3 Pairings

170

8.3.4 Commutative Encryption

171

8.3.5 Intersection Protocol

172

8.4 A Pseudonym Scheme with Ubiquitous TTP

173

8.5 A Basic Pseudonym Scheme with Light TTP

175

8.6 A Fully Secure Pseudonym Scheme with Light TTP

179

8.7 Conclusion

183

References

183

9 Privacy-Aware Access Control in Social Networks: Issues and Solutions

185

9.1 Introduction

185

9.2 Access Control Requirements

187

9.3 Privacy Issues in OSN Access Control

190

9.4 Review of the Literature

191

9.4.1 Access Control Models

191

9.4.2 Privacy-Aware Access Control

194

9.5 Conclusions and Future Research Directions

197

References

198

Index

200