The Challenges of Effectively Anonymizing Network Data
- 1 March 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 230-236
- https://doi.org/10.1109/catch.2009.27
Abstract
The uncertainties that currently exist about the efficacy of network data anonymization, from both technical and policy perspectives, leave the research community in a vulnerable position. Even as the field marches forward, it does so with little understanding of the implications of publishing anonymized network data on the privacy of the networks being monitored and the utility to researchers. Without that understanding, data publishers are left to wonder what fields must be anonymized to avoid legal fallout, while researchers question the confidence of results gained from the data. However, the extensive work done on micro- data anonymity provides the network research community with several useful insights about how to effectively apply anonymization to published data. At the same time, prior wisdom cannot be applied directly without first overcoming several challenges, including the development of appropriate privacy and utility definitions for the more complex case of network data. Addressing these challenges is essential, in our view, to ensure the continued, yet responsible, availability of network trace data to support security research.Keywords
This publication has 26 references indexed in Scilit:
- Verification servers: Enabling analysts to assess the quality of inferences from public use dataComputational Statistics & Data Analysis, 2009
- A Framework for Evaluating the Utility of Data Altered to Protect ConfidentialityThe American Statistician, 2006
- The devil and packet trace anonymizationACM SIGCOMM Computer Communication Review, 2006
- The internet measurement data catalogACM SIGCOMM Computer Communication Review, 2005
- Data Dissemination and Disclosure Limitation in a World Without Microdata: A Risk–Utility Framework for Remote Access Analysis ServersStatistical Science, 2005
- Remote physical device fingerprintingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeComputer Networks, 2004
- A high-level programming environment for packet trace anonymization and transformationPublished by Association for Computing Machinery (ACM) ,2003
- Remote access systems for statistical analysis of microdataStatistics and Computing, 2003
- Data-swapping: A technique for disclosure controlJournal of Statistical Planning and Inference, 1982