
 
interactive since it involves the user in the decision-
making  process.  The  latter  can  also  query  the 
ontology to obtain the necessary knowledge. Securing 
data  by  anonymization and  preserving  an  intended 
quality  are  usually  contradictory  objectives. 
Therefore, the anonymization process, implemented 
in  MAGGO,  aims  at  a  trade-off  between  these 
objectives, depending on the usage requirement of the 
anonymized data. Our approach is currently limited 
to anonymization of microdata sets by generalization. 
However, we have endeavored to make it as generic 
as possible so that it can be applied to other microdata 
anonymization  techniques.  Finally,  to  promote  its 
evolution  and  its  incremental  implementation,  we 
opted  for  a  model  driven  approach.  OPAM  was 
published in a previous paper. The contribution of this 
paper  is  twofold:  i)  a  meta-model  to  describe  the 
different  components  of  the  approach,  ii)  the 
methodology  MAGGO  which  performs  the  whole 
anonymization process. Moreover, we  illustrate the 
contributions  with  an  example  and  describe  a 
controlled  experiment  conducted  to  validate  the 
added  value  of  the  approach.  There  are  two  main 
avenues for future work. First, we want to conduct an 
experiment on a larger scale including users that have 
low skills in computer science in order to obtain a 
stronger evaluation of MAGGO. This will allow us to 
confirm  the  usability  of  our  approach  and  tool. 
Second, we want to perform the same effort to extend 
MAGGO  to  other  micro-data  anonymization 
techniques.  
REFERENCES 
BenFredj,  F.,  Lammari,  N.,  Comyn-Wattiau,  I.,  2015. 
Building  an  Ontology  to  Capitalize  and  Share 
Knowledge on Anonymization Techniques. In ECKM 
2015,  16th  European  Conference  on  Knowledge 
Management, pp 122-131.  Edited by Massaro,  M.  & 
Garlatti, A., ISBN: 978-1-910810-46-0.  
BenFredj,  F.,  Lammari,  N.,  Comyn-Wattiau,  I.,  2014. 
Characterizing  Generalization  Algorithms-First 
Guidelines  for  Data  Publishers,  In  KMIS  2014, 
International Conference on Knowledge Management 
and  Information  Sharing,  pp  360-366.  SciTePress 
Science and Technology Publications. ISBN: 978-989-
758-050-5. 
Brand,  R.,  2002.  Microdata  Protection  through  Noise 
Addition, In Inference Control in Statistical Databases-
From  Theory  to  Practice.  Domingo-Ferrer  (Ed.),  pp 
97-116. Springer.  
Dai,  C.,  Ghinita,  G.,  Bertino,  E.,  Byun,  J.,  Li,  N.2009. 
TIAMAT: a Tool for Interactive Analysis of Microdata 
Anonymization  Techniques,  In  VLDB’09,  Vol  2(2), 
1618-1621.  
Defays, D., Nanopoulos, P., 1993. Panels of Enterprises and 
Confidentiality: the Small Aggregates Method, In 92nd 
Symposium  on  Design  and  Analysis  of  Longitudinal 
Surveys, pp 195-204, Ontorio, Canada.  
Fienberg,  S.E.,  McIntyre,  J.,  2004.  Data  swapping: 
Variations on a theme by dalenius and reiss, In PSD 
2004, Privacy in statistical databases, LNCS 3050, pp. 
14-29. Domingo-Ferrer & Torra (Eds.), Springer.  
Fung,  B.  C.  M.,  Wang,  K.,  Chen,  R.,  Yu,  P.  S.,  2010. 
Privacy Preserving Data Publishing-a survey of recent 
developments, In ACM Comput. Survey, Vol. 42(4), pp 
14:1-14:53.  
Ilavarasi, B., Sathiyabhama,  A. K., Poorani,  S., 2013.  A 
survey on privacy preserving data mining techniques, 
In IJCSBI journal, 7(1), ISSN: 1694, pp 209-221.  
Loh,  W-Y.,  2011.  Classification and  regression  trees,  In 
Wiley  Interdisc.  Rew.:  Data  Mining  and  Knowledge 
Discovery, Vol 1(1), pp 14-23.  
Madan,  A.,  Dubey,  S.  K.,  2012.  Usability  Evaluation 
Methods: a Literature Review. In IJEST journal, ISSN 
0975-5462, Vol 4(2). 
Patel,  L.,  Gupta,  R.,  2013.  A  Survey  of  Perturbation 
Technique  for  Privacy-Preserving  of  Data,  In  IJTAE 
journal, Vol 3(6), pp 162-166, ISSN 2250-2459.  
Poulis,  G.,  Gkoulalas-Divanis,  A.,  Loukides,  G., 
Skiadopoulos, S., Tryfonopoulos, C., 2015. SECRETA: 
A System for Evaluating and Comparing Relational and 
Transaction  Anonymization  algorithms,  In  Medical 
Data  Privacy  Handbook,  Chapter  4,  Springer  Int. 
Publishing, pp.83-109.  
Saaty, T.L, Sodenkamp, M.A., 2008. Making decisions in 
hierarchic  and  network  systems,  In  IJADS  journal, 
ISSN 1755-8077, Vol 1(1), pp 24-79.  
Samarati,  P.,  2001.  Protecting  respondents’  identities  in 
microdata release, In IEEE Trans. on Knowl. and Data 
Eng., Vol 13(6), pp 1010-1027.  
Silver,  M.  S.,  2006.  Broadening  the  Scope.  Human-
Computer  Interaction  and  Management  Information 
Systems: Foundations, 90. 
Sweeney, L., 2002. k-Anonymity: A model for Protecting 
Privacy,  Int.  Journal  of  Uncertainty,  Fuzziness  and 
Knowledge-Based Systems, Vol 10(5), pp 557-570.  
Xiao,  X.,  Wang,  G.,  Gehrke,  G.,  2009.  Interactive 
Anonymization  of  Sensitive  Data,  In  SIGMOD’09, 
Binnig C.  & Dageville B.(Eds.), pp  1051–1054, New 
York, USA.  
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
170