PrivacyEnhancing k-Anonymization of Customer Data
Sheng Zhong - SUNY at Buffalo
Apr 27, 2005Size: 218.2MB
Download: MP4 Video
Watch in your Browser
AbstractIn order to protect individuals' privacy, the technique of
k-anonymization has been proposed to de-associate sensitive
attributes from the corresponding identifiers. In this work,
we provide privacy-enhancing methods for creating k-anonymous
tables in a distributed scenario. Specifically, we consider a
setting in which there is a set of customers, each of whom
has a row of a table, and a miner, who wants to mine the en-
tire table. Our objective is to design protocols that allow the
miner to obtain a k-anonymous table representing the
customer data, in such a way that does not reveal any
extra information that can be used to link sensitive
attributes to corresponding identifiers, and without
requiring a central authority who has access to all the
original data. We give two different formulations of
this problem, with provably private solutions. Our solutions
enhance the privacy of k-anonymization in the distributed
scenario by maintaining end-to-end privacy from the original
customer data to the final k-anonymous results.
About the SpeakerSheng Zhong received his Ph.D in computer science from
Yale University in the year of 2004. He holds an assistant
professor position at SUNY Buffalo and is currently on
leave for postdoctoral research at the Center for Discrete
Mathematics and Theoretical Computer Science (DIMACS).
His research interests, on the practical side, are
security and incentives in data mining, databases, and
wireless networks. On the theoretical side, he is interested
in cryptography and game theory.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.