Publishing Set-Valued Data Against Realistic Adversaries

  title={Publishing Set-Valued Data Against Realistic Adversaries},
  author={Jun-Qiang Liu},
  journal={Journal of Computer Science and Technology},
Privacy protection in publishing set-valued data is an important problem. However, privacy notions proposed in prior works either assume that the adversary has unbounded knowledge and hence provide over-protection that causes excessive distortion, or ignore the knowledge about the absence of certain items and do not prevent attacks based on such knowledge. To address these issues, we propose a new privacy notion, (k, ℓ)(m,n)-privacy, which prevents both the identity disclosure and the sensitive… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper


Publications citing this paper.
Showing 1-5 of 5 extracted citations

PrivSet: Set-Valued Data Analyses with Locale Differential Privacy

IEEE INFOCOM 2018 - IEEE Conference on Computer Communications • 2018
View 4 Excerpts
Highly Influenced

Evaluation Mechanism of Privacy Protection on Dynamic Data Targeted at Data Partition

2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems • 2015
View 1 Excerpt

A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data

International Journal of Software Engineering and Knowledge Engineering • 2014
View 2 Excerpts


Publications referenced by this paper.
Showing 1-10 of 28 references

Utility-based anonymization using local recoding

KDD • 2006
View 14 Excerpts
Highly Influenced

On optimal anonymization for l+-diversity

2010 IEEE 26th International Conference on Data Engineering (ICDE 2010) • 2010
View 4 Excerpts
Highly Influenced

On the Anonymization of Sparse High-Dimensional Data

2008 IEEE 24th International Conference on Data Engineering • 2008
View 9 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…