loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Sara Barakat 1 ; Bechara Al Bouna 1 ; Mohamed Nassar 2 and Christophe Guyeux 3

Affiliations: 1 Antonine University, Lebanon ; 2 MUBS, Lebanon ; 3 University of Bourgogne Franche-Comté, France

ISBN: 978-989-758-196-0

Keyword(s): Disassociation, Privacy Breach, Data Privacy, Set-valued, Privacy Preserving.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Information and Systems Security ; Personal Data Protection for Information Systems ; Privacy

Abstract: Data anonymization is gaining much attention these days as it provides the fundamental requirements to safely outsource datasets containing identifying information. While some techniques add noise to protect privacy others use generalization to hide the link between sensitive and non-sensitive information or separate the dataset into clusters to gain more utility. In the latter, often referred to as bucketization, data values are kept intact, only the link is hidden to maximize the utility. In this paper, we showcase the limits of disassociation, a bucketization technique that divides a set-valued dataset into km-anonymous clusters. We demonstrate that a privacy breach might occur if the disassociated dataset is subject to a cover problem. We finally evaluate the privacy breach using the quantitative privacy breach detection algorithm on real disassociated datasets.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.227.249.234

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Barakat, S.; Al Bouna, B.; Nassar, M. and Guyeux, C. (2016). On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets.In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 318-326. DOI: 10.5220/0005969403180326

@conference{secrypt16,
author={Sara Barakat. and Bechara Al Bouna. and Mohamed Nassar. and Christophe Guyeux.},
title={On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={318-326},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005969403180326},
isbn={978-989-758-196-0},
}

TY - CONF

JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets
SN - 978-989-758-196-0
AU - Barakat, S.
AU - Al Bouna, B.
AU - Nassar, M.
AU - Guyeux, C.
PY - 2016
SP - 318
EP - 326
DO - 10.5220/0005969403180326

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.