2010
DOI: 10.1002/spe.992
|View full text |Cite
|
Sign up to set email alerts
|

A survey on statistical disclosure control and micro‐aggregation techniques for secure statistical databases

Abstract: This paper surveys the fields of Statistical Disclosure Control (SDC) and Micro‐Aggregation Techniques (MATs), which are both areas fundamental to the science of secure Statistical DataBases (SDBs). The paper is written from the perspective of a computer scientist with the hope that it will prove to be a source of reference material useful to researchers and practitioners in the field. The paper first introduces the concept of SDC and describes the domain of its applications and the various data types that are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
4

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(19 citation statements)
references
References 81 publications
0
15
0
4
Order By: Relevance
“…Larger cluster sizes result in greater data perturbation. To construct clusters, one can project data onto a single dimension, for example, using the first principal component or the sum of z-scores (Fayyoumi and Oommen 2010). Alternatively, one can find the clusters using a heuristic based on Euclidean distances between records.…”
Section: Summary Of Selected Sdl Methodsmentioning
confidence: 99%
“…Larger cluster sizes result in greater data perturbation. To construct clusters, one can project data onto a single dimension, for example, using the first principal component or the sum of z-scores (Fayyoumi and Oommen 2010). Alternatively, one can find the clusters using a heuristic based on Euclidean distances between records.…”
Section: Summary Of Selected Sdl Methodsmentioning
confidence: 99%
“…Unlike in ACNN, in our solution, we do not compute the sum of all the interactions between the nodes but rather need the one that maximally interacts with the nodes that are already in the same cluster, e.g., X i and X j . Thus, as explained in [33], we advocate the use of semiring transitive closure properties similar to a matrix multiplication scheme that is central in determining the multistep Markov matrix for a Markov chain. 4) The final difference between our scheme and ACNN is the fact that we have resorted to a one-shot "training" mechanism, 3 which is atypical for most NNs but was used in [1].…”
Section: Iamatmentioning
confidence: 99%
“…4) The final difference between our scheme and ACNN is the fact that we have resorted to a one-shot "training" mechanism, 3 which is atypical for most NNs but was used in [1]. Details of this mechanism are also found in [33] and were omitted here for brevity. Based on the aforementioned principles, we now present the design of our newly proposed IAMAT scheme.…”
Section: Iamatmentioning
confidence: 99%
“…Microaggregation is a perturbative technique for microdata (i.e individual records) protection appearing in statistical disclosure control [3]. Given a dataset, it builds small groups of at least k records, with k being a user-definable parameter.…”
Section: Introductionmentioning
confidence: 99%