2021
DOI: 10.1002/spy2.202
|View full text |Cite
|
Sign up to set email alerts
|

Limiting sensitive values in an anonymized table while reducing information loss via p‐proportion

Abstract: The p‐proportion model bounds the proportion of sensitive values of a sensitive attribute in each equivalence class of an anonymized database table in order to limit the ability of a user to link an individual or entity to a sensitive value in that table. Nonsensitive values are not subject to any such constraints, which reduces the amount of anonymization needed to meet the requirements of this model. This leads to less information loss in an anonymized table. Anonymization is performed using an extension of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 51 publications
0
3
0
Order By: Relevance
“…Notably, Aminifar et al's approach undertakes a binary classification of sensitive attributes, neglecting to secure attributes classified as negative. In addition, although AM, 42 a technology grounded in the Mondrian algorithm, represents a recent advancement, it was also eschewed from this study. As discussed in the relevant research section, anatomy possesses superior accuracy compared to Mondrian; therefore, we opted for a comparison with HBA, which is predicated upon the anatomy algorithm.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Notably, Aminifar et al's approach undertakes a binary classification of sensitive attributes, neglecting to secure attributes classified as negative. In addition, although AM, 42 a technology grounded in the Mondrian algorithm, represents a recent advancement, it was also eschewed from this study. As discussed in the relevant research section, anatomy possesses superior accuracy compared to Mondrian; therefore, we opted for a comparison with HBA, which is predicated upon the anatomy algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…Herein, we discuss the most recent advancement in anonymization technology, adapted Mondrian (AM), introduced by Dosselmann et al 42 AM is a refined version of the earlier anonymization algorithm Mondrian 22 . Dosselmann and associates categorize sensitive attributes into “sensitive values” and “nonsensitive values” to minimize information loss.…”
Section: Related Workmentioning
confidence: 99%
“…The algorithm requires that the frequency of sensitive data in the same equivalent class with high sensitivity is less than the threshold, but it cannot guarantee the security of sensitive data with low sensitivity. Onesimu et al [ 21 ] and Dosselmann et al [ 22 ] generate equivalence classes through a bottom-up clustering algorithm and an improved Mondrian algorithm, respectively. Then, they generalize each equivalence class to achieve data anonymity.…”
Section: Related Workmentioning
confidence: 99%