2020
DOI: 10.1007/978-3-030-46150-8_37
|View full text |Cite
|
Sign up to set email alerts
|

String Sanitization: A Combinatorial Approach

Abstract: String data are often disseminated to support applications such as location-based service provision or DNA sequence analysis. This dissemination, however, may expose sensitive patterns that model confidential knowledge (e.g., trips to mental health clinics from a string representing a user's location history). In this paper, we consider the problem of sanitizing a string by concealing the occurrences of sensitive patterns, while maintaining data utility. First, we propose a time-optimal algorithm, TFS-ALGO, to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
35
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2
1

Relationship

4
1

Authors

Journals

citations
Cited by 6 publications
(35 citation statements)
references
References 24 publications
0
35
0
Order By: Relevance
“…In this paper, we study the fundamental relation between data sanitization [1], [4], [27] (also known as knowledge hiding) and frequent pattern mining [19], [22], [25]. The objective of frequent pattern mining in strings is to obtain all patterns occurring frequently enough in a string, or in a collection of strings.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…In this paper, we study the fundamental relation between data sanitization [1], [4], [27] (also known as knowledge hiding) and frequent pattern mining [19], [22], [25]. The objective of frequent pattern mining in strings is to obtain all patterns occurring frequently enough in a string, or in a collection of strings.…”
Section: Introductionmentioning
confidence: 99%
“…There may also be constraints for the mined strings (e.g., to be of fixed length k [3], [9]). In string sanitization, the privacy objective is to transform a string to ensure that a given set of sensitive patterns, modeling confidential knowledge, does not occur in the sanitized version of the string; sensitive patterns are selected based on domain expertise [4], [15], [27]. This transformation may incur some utility loss that should be minimized.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations