• Corpus ID: 16215087

Introduction to Statistical Disclosure Control ( SDC )

  title={Introduction to Statistical Disclosure Control ( SDC )},
  author={Bernhard Meindl and Matthias Templ and Alexander Kowarik},
Dissemination and use of this Working Paper is encouraged. Reproduced copies may however not be used for commercial purposes. The findings, interpretations, and views expressed in this paper are those of the author(s) and do not necessarily represent those of the International Household Survey Network member agencies or secretariat. To support research and policymaking, there is an increasing demand for microdata. Microdata are data that hold information collected on individual units, such as… 

Figures and Tables from this paper

On statistical disclosure control technologies : for enabling personal data protection in open data settings
The main objective of the study is to provide in-sights in the main functionalities provided by SDC technologies so that data control-lers can be supported in their decision-making processes related to storing, sharing, and opening the ministry’s personal data.
Regrouped design in privacy analysis for multinomial microdata
In this paper, we are dealing with the dual goals for protecting privacy and making statistical inferences from the disseminated data using the regrouped design. It is not difficult to protect the
Multivariate Microaggregation of Set-Valued Data
An adaptive size clustering technique is proposed that aggregates homogeneous records in similar clusters, and the size of the clusters is determined after the semantic analysis of the records by considering issues of cohesiveness and distance.
A proposed de-identification framework for a cohort of children presenting at a health facility in Uganda
A standardized framework for the de-identification of data generated from cohort studies in children in a low-and-middle income country is proposed that can be adapted and refined based on specific context and risks.
Linking Sensitive Data: Methods and Techniques for Practical Privacy-Preserving Information Sharing
It is shown that linking individual records from different databases is indispensable for many research purposes and data usage in practical applications, and the need for the techniques presented in this book is becoming more important.
Risk-Based Privacy-Aware Access Control for Threat Detection Systems
A risk-based privacy-aware access control framework for threat detection systems, where each access request is evaluated by comparing the privacy-risk and the trustworthiness of the request, and it is shown how the framework can simultaneously address both the privacy and the utility requirements.
Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems
A trust- and risk-aware access control framework for Threat Detection Systems, where each access request is evaluated by comparing the privacy-risk and the trustworthiness of the request, and it is shown how this model can provide meaningful results, and real-time performance, for an industrial threat detection solution.
Factor Analysis for Anonymization
This paper presents a new method to anonymize (share relevant and detailed information while not naming names) and protect data sets (minimize the utility loss) based on Factor Analysis and performs a simulation study to compare it with two alternative techniques.
The Pursuit of Patterns in Educational Data Mining as a Threat to Student Privacy
Recent technological advances have led to tremendous capacities for collecting, storing and analyzing data being created at an ever-increasing speed from diverse sources. Academic institutions which


Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
  • M. Templ
  • Computer Science
    Trans. Data Priv.
  • 2008
The R package sdcMicro serves as an easy-to-handle, object-oriented S4 class implementation of SDC methods to evaluate and anonymize confidential micro-data sets and performs automated recalculation of frequency counts, individual and global risk measures, information loss and data utility statistics after each anonymization step.
Post randomisation for statistical disclosure control: Theory and implementation
The Post RAndomisation Method (PRAM) is a perturbative method for disclosure protection of categorical variables that is employed in the case of highly sensitive questions to which the respondent is not likely to respond truthfully in a face-to-face setting.
Protecting Respondents' Identities in Microdata Release
  • P. Samarati
  • Computer Science
    IEEE Trans. Knowl. Data Eng.
  • 2001
This paper addresses the problem of releasing microdata while safeguarding the anonymity of respondents to which the data refer and introduces the concept of minimal generalization that captures the property of the release process not distorting the data more than needed to achieve k-anonymity.
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
Disclosure limitation methods in use - results of a survey, F. Felso, J. Theeuwes, G.G. Wagner Information Explosion, L. Sweeney Disclosure risk assessment, M. Elliot Disclosure control methods and
Information preserving statistical obfuscation
  • J. Burridge
  • Computer Science, Mathematics
    Stat. Comput.
  • 2003
A model based approach to the problem of limiting the disclosure of information gathered on a set of companies or individuals is considered by utilizing the information contained in the sufficient statistics obtained from fitting a model to the public data by conditioning on the survey data.
Robust Statistics Meets SDC: New Disclosure Risk Measures for Continuous Microdata Masking
The aim of this study is to evaluate the risk of re-identification related to distance-based disclosure risk measures for numerical variables by proposing a weighting scheme for each observation based on the concept of robust Mahalanobis distances.
Chapter 6 A Quantitative Comparison of Disclosure Control Methods for Microdata
This chapter provides guidance in choosing a particular SDC method by comparing some of the methods discussed in Chapter 5 on the basis of both information loss and disclosure risk.
Practical Data-Oriented Microaggregation for Statistical Disclosure Control
In this paper, candidate optimal solutions to the multivariate and univariate microaggregation problems are characterized and two heuristics based on hierarchical clustering and genetic algorithms are introduced which are data-oriented in that they try to preserve natural data aggregates.
Statistical disclosure control in tabular data
This chapter is a short introduction to tabular data protection, with a particular focus on two of them: “cell suppression problem” and “controlled tabular adjustment”.
k-Anonymity: A Model for Protecting Privacy
  • L. Sweeney
  • Computer Science
    Int. J. Uncertain. Fuzziness Knowl. Based Syst.
  • 2002
The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.