Aggregate query answering on anonymized tables

Qing Zhang*, Nick Koudas, Divesh Srivastava, Ting Yu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

295 Citations (Scopus)

Abstract

Privacy is a serious concern when microdata need to be released for ad hoc analyses. The privacy goals of existing privacy protection approaches (e.g., k-anonymity and ℓ-diversity) are suitable only for categorical sensitive attributes. Since applying them directly to numerical sensitive attributes (e.g., salary) may result in undesirable information leakage, we propose privacy goals to better capture the need of privacy protection for numerical sensitive attributes. Complementing the desire for privacy is the need to support ad hoc aggregate analyses over microdata. Existing generalization-based anonymization approaches cannot answer aggregate queries with reasonable accuracy. We present a general framework of permutation-based anonymization to support accurate answering of aggregate queries and show that, for the same grouping, permutation-based techniques can always answer aggregate queries more accurately than generalization-based approaches. We further propose several criteria to optimize permutations for accurate answering of aggregate queries, and develop efficient algorithms for each criterion.

Original languageEnglish
Title of host publication23rd International Conference on Data Engineering, ICDE 2007
Pages116-125
Number of pages10
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event23rd International Conference on Data Engineering, ICDE 2007 - Istanbul, Turkey
Duration: 15 Apr 200720 Apr 2007

Publication series

NameProceedings - International Conference on Data Engineering
ISSN (Print)1084-4627

Conference

Conference23rd International Conference on Data Engineering, ICDE 2007
Country/TerritoryTurkey
CityIstanbul
Period15/04/0720/04/07

Fingerprint

Dive into the research topics of 'Aggregate query answering on anonymized tables'. Together they form a unique fingerprint.

Cite this