Privacy-preserving data publishing
Top Cited Papers
- 23 June 2010
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Computing Surveys
- Vol. 42 (4), 1-53
- https://doi.org/10.1145/1749603.1749605
Abstract
The collection of digital information by governments, corporations, and individuals has created tremendous opportunities for knowledge- and information-based decision making. Driven by mutual benefits, or by regulations that require certain data to be published, there is a demand for the exchange and publication of data among various parties. Data in its original form, however, typically contains sensitive information about individuals, and publishing such data will violate individual privacy. The current practice in data publishing relies mainly on policies and guidelines as to what types of data can be published and on agreements on the use of published data. This approach alone may lead to excessive data distortion or insufficient protection. Privacy-preserving data publishing (PPDP) provides methods and tools for publishing useful information while preserving data privacy. Recently, PPDP has received considerable attention in research communities, and many approaches have been proposed for different data publishing scenarios. In this survey, we will systematically summarize and evaluate different approaches to PPDP, study the challenges in practical data publishing, clarify the differences and requirements that distinguish PPDP from other related problems, and propose future research directions.Funding Information
- Natural Sciences and Engineering Research Council of Canada (356065-2008)
This publication has 108 references indexed in Scilit:
- Privacy-preserving data publishing for cluster analysisData & Knowledge Engineering, 2009
- A framework for condensation-based anonymization of string dataData Mining and Knowledge Discovery, 2008
- Thoughts on k-anonymizationData & Knowledge Engineering, 2007
- Anonymity preserving pattern discoveryThe VLDB Journal, 2006
- Handicapping attacker's confidence: an alternative to k-anonymizationKnowledge and Information Systems, 2006
- Security checking in relational database management systems augmented with inference enginesComputers & Security, 1987
- Practical data-swapping: the first stepsACM Transactions on Database Systems, 1984
- Suppression Methodology and Statistical Disclosure ControlJournal of the American Statistical Association, 1980
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978
- Randomized Response: A Survey Technique for Eliminating Evasive Answer BiasJournal of the American Statistical Association, 1965