2016
DOI: 10.1007/978-3-319-45381-1_16
|View full text |Cite
|
Sign up to set email alerts
|

A New Algorithm for Protecting Aggregate Business Microdata via a Remote System

Abstract: Releasing business microdata is a challenging problem for many statistical agencies. Businesses with distinct continuous characteristics such as extremely high income could easily be identified while these businesses are normally included in surveys representing the population. In order to provide data users with useful statistics while maintaining confidentiality, some statistical agencies have developed online based tools to allow users to specify and request tables created from microdata. These tools only r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Attribute risks from differencing attacks can be reduced if an output perturbation algorithm is used. In the chapter, we introduce an innovative output perturbation algorithm against differencing attack strategies (see also [5]). The performance of the algorithm is compared with an algorithm in [8].…”
mentioning
confidence: 99%
“…Attribute risks from differencing attacks can be reduced if an output perturbation algorithm is used. In the chapter, we introduce an innovative output perturbation algorithm against differencing attack strategies (see also [5]). The performance of the algorithm is compared with an algorithm in [8].…”
mentioning
confidence: 99%
“…However, as noted in Nayak et al (2011), evaluating value disclosure risk is difficult because different data intruders may have different target values as well as different prior knowledge about the original data. To understand potential disclosure risks of a data masking mechanism, a common approach in the literature is to model intrusion behaviors ( Ma et al 2016). Correspondingly, appropriate actions could be made during data masking stage such that the released data is protected against these behaviours.…”
mentioning
confidence: 99%