L-diversity: privacy beyond k-anonymity
Top Cited Papers
- 1 January 2006
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 10636382,p. 24
- https://doi.org/10.1109/icde.2006.1
Abstract
Publishing data about individuals without revealing sensitive information about them is an important problem. In recent years, a new definition of privacy called \kappa-anonymity has gained popularity. In a \kappa-anonymized dataset, each record is indistinguishable from at least k—1 other records with respect to certain "identifying" attributes. In this paper we show with two simple attacks that a \kappa-anonymized dataset has some subtle, but severe privacy problems. First, we show that an attacker can discover the values of sensitive attributes when there is little diversity in those sensitive attributes. Second, attackers often have background knowledge, and we show that \kappa-anonymity does not guarantee privacy against attackers using background knowledge. We give a detailed analysis of these two attacks and we propose a novel and powerful privacy definition called \ell-diversity. In addition to building a formal foundation for \ell-diversity, we show in an experimental evaluation that \ell-diversity is practical and can be implemented efficiently.Keywords
This publication has 15 references indexed in Scilit:
- L -diversityACM Transactions on Knowledge Discovery From Data, 2007
- IncognitoPublished by Association for Computing Machinery (ACM) ,2005
- On the complexity of optimal K-anonymityPublished by Association for Computing Machinery (ACM) ,2004
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Protecting respondents identities in microdata releaseIEEE Transactions on Knowledge and Data Engineering, 2001
- Algebraic algorithms for sampling from conditional distributionsThe Annals of Statistics, 1998
- From statistical knowledge bases to degrees of beliefArtificial Intelligence, 1996
- Security-control methods for statistical databases: a comparative studyACM Computing Surveys, 1989
- Data-swapping: A technique for disclosure controlJournal of Statistical Planning and Inference, 1982
- Suppression Methodology and Statistical Disclosure ControlJournal of the American Statistical Association, 1980