Please enable JavaScript.
Coggle requires JavaScript to display documents.
(1) PRIVACY IN DATA PUBLICATION - Coggle Diagram
(1) PRIVACY IN DATA PUBLICATION
Statistical
DBMS
Data
Data
Microdata
Macrodata
Count/Frequency
Magnitude Data
Information diclosure
Identity disclosure
MacroData
Microdata
Attribute disclosure
Revealed exactly
Closely estimated
Inferential disclosure
Restricted data and restricted acces (microdata)
Protection for count/frequencies macrodata
Sampling
Special rules
Threshold rules
Disclosure protection techniques for microdata
Masking techniques
Non perturbative (details suppressed)
Perturbative (Rounding and swapping)
Synthetic data generationtechniques
Fully synthetic
Partially synthetic
Anonymity problem
Deidentificazone
Reidentificazione
Classification of attributes in a microdata table
Identifiers
Quasi-identifiers
Confidential
Non confidential
Factors contributing disclosure risk
Existence of high visibility record
Possibility of matching the microdata with external information
high number common attribute between micro and macro
the accuracy or resolution of the data
the number and richness of outside sources
Factors contributing do DECREASE the disclosure risk
Subset of the whole population
not always up to date
Noise
Different forms of data (data release and external data)
K-anonymity
k anonymity requires that each quasi-indientifiers must occurs at list k times
Generalization
Generalization with suppression
Distance Vector
K-minimal
Generalize table with suppression
Value generalization hierarchy
Domain generalization hierarchy
Minimal Generalization criteria
Minimum absolute distance
minimum relative distance
maximum distribution
minimum suppression
Classification of k-anonymity techniques
Generalization
Suppression
Algorithms for AG
TS and AG
Computing K-minimal solution
k-Optimize algorithm
Incognito algorithm
Algorithms for
CS and CG
Mondrian Multidimensional algorithm
K-anonymity rivisited
Attribute disclosure
Homogeneity of the sensitive attribute values
Background knowledge
L-diversity
skewness attack
Similarity attack
Group Closeness
External knowledge
Multiple releases
M-invariance
Attribute disclosure 2
k-anonymity in location-based services
Privacy in location based application
AOL data release
Syntatic vs semantic privacy
Differential privacy
k-anonymity vs differential privacy