dc.contributor.author | Bagai, Rajiv | |
dc.contributor.author | Malik, Nafia | |
dc.contributor.author | Jadliwala, Murtuza Shabbir | |
dc.date.accessioned | 2017-03-27T21:29:42Z | |
dc.date.available | 2017-03-27T21:29:42Z | |
dc.date.issued | 2017-05 | |
dc.identifier.citation | R. Bagai, N. Malik and M. Jadliwala, "Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks," in IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1156-1169, May 2017 | en_US |
dc.identifier.issn | 1556-6013 | |
dc.identifier.other | WOS:000395869700013 | |
dc.identifier.uri | http://dx.doi.org/10.1109/TIFS.2017.2656458 | |
dc.identifier.uri | http://hdl.handle.net/10057/12910 | |
dc.description | Click on the DOI link to access the article (may not be free). | en_US |
dc.description.abstract | There is clear demand among organizations for sharing their data for mining and other purposes without compromising the privacy of individual objects contained in the data. Pseudonymization is a simple, yet widely employed technique for sanitizing such data prior to its release; it replaces identifying names in the data by pseudonyms. Well-known metrics already exist in the literature for measuring the amount of anonymity still contained in some pseudonymized data in the aftermath of an infeasibility background attack. While the need for a metric for the much wider and more realistic class of probabilistic background attacks has also been well identified, currently no such metric exists. We fulfill that long identified need by presenting two metrics, an approximate and a more exact one, for measuring anonymity in pseudonymized data in the wake of a probabilistic attack. These metrics are rather intractable, thus impractical to employ in real-life situations. Therefore, we also develop an efficient heuristic for our superior metric, and show the remarkable accuracy of our heuristic. Our metrics and heuristic assist a data owner in evaluating the safety level of pseudonymized data against probabilistic attacks before making a decision on its release. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | IEEE Transactions on Information Forensics and Security;v.12:no.5 | |
dc.subject | Pseudonymization | en_US |
dc.subject | Degree of anonymity | en_US |
dc.subject | Infeasibility attacks | en_US |
dc.subject | Probabilistic attacks | en_US |
dc.subject | Combinatorial matrix theory | en_US |
dc.subject | Forecasting errors | en_US |
dc.title | Measuring anonymity of pseudonymized data after probabilistic background attacks | en_US |
dc.type | Article | en_US |
dc.rights.holder | © Copyright 2017 IEEE - All rights reserved. | en_US |