7 CONCLUSION
In this article, we have proposed a formal model of
the set-valued data and the disassociation technique.
The cover problem has been defined, while its effects
on the disassociation of the dataset has been regarded.
Such investigations have led to the quantitative pri-
vacy breach detection algorithm, whose efficiency has
been studied. By this way, we have shown in what ex-
tent a disassociated dataset can be vulnerable. In the
near future, we intend to develop partial suppression
in disassociated dataset and evaluate the gain in utility
that the disassociation provides.
REFERENCES
al Bouna, B., Clifton, C., and Malluhi, Q. M. (2015a).
Anonymizing transactional datasets. Journal of Com-
puter Security, 23(1):89–106.
al Bouna, B., Clifton, C., and Malluhi, Q. M. (2015b). Effi-
cient sanitization of unsafe data correlations. In Pro-
ceedings of the Workshops of the EDBT/ICDT 2015
Joint Conference (EDBT/ICDT), Brussels, Belgium,
March 27th, 2015., pages 278–285.
Barbaro, M. and Zeller, T. (2006). A face is exposed for aol
searcher no. 4417749.
Biskup, J., PreuB, M., and Wiese, L. (2011). On the
inference-proofness of database fragmentation satis-
fying confidentiality constraints. In Proceedings of the
14th Information Security Conference, Xian, China.
Ciriani, V., Vimercati, S. D. C. D., Foresti, S., Jajodia,
S., Paraboschi, S., and Samarati, P. (2010). Combin-
ing fragmentation and encryption to protect privacy in
data storage. ACM Trans. Inf. Syst. Secur., 13:22:1–
22:33.
Cormode, G., Li, N., Li, T., and Srivastava, D. (2010). Mini-
mizing minimality and maximizing utility: Analyzing
method-based attacks on anonymized data. In Pro-
ceedings of the VLDB Endowment, volume 3, pages
1045–1056.
Dwork, C., McSherry, F., Nissim, K., and Smith, A. (2006).
Calibrating noise to sensitivity in private data analysis.
In Proceedings of the Third Conference on Theory of
Cryptography, TCC’06, pages 265–284, Berlin, Hei-
delberg. Springer-Verlag.
Fard, A. M. and Wang, K. (2010). An effective cluster-
ing approach to web query log anonymization. In
Security and Cryptography (SECRYPT), Proceedings
of the 2010 International Conference on, pages 1–11.
IEEE.
He, Y. and Naughton, J. F. (2009). Anonymization of set-
valued data via top-down, local generalization. Proc.
VLDB Endow., 2(1):934–945.
Jia, X., Pan, C., Xu, X., Zhu, K., and Lo, E. (2014). -
uncertainty anonymization by partial suppression. In
Bhowmick, S., Dyreson, C., Jensen, C., Lee, M.,
Muliantara, A., and Thalheim, B., editors, Database
Systems for Advanced Applications, volume 8422 of
Lecture Notes in Computer Science, pages 188–202.
Springer International Publishing.
Kifer, D. (2009). Attacks on privacy and definetti’s theorem.
In SIGMOD Conference, pages 127–138.
Li, T., Li, N., Zhang, J., and Molloy, I. (2012). Slicing: A
new approach for privacy preserving data publishing.
IEEE Trans. Knowl. Data Eng., 24(3):561–574.
Loukides, G., Liagouris, J., Gkoulalas-Divanis, A., and
Terrovitis, M. (2014a). Disassociation for electronic
health record privacy. Journal of Biomedical Infor-
matics, 50:46–61.
Loukides, G., Liagouris, J., Gkoulalas-Divanis, A., and
Terrovitis, M. (2014b). Disassociation for electronic
health record privacy. Journal of Biomedical Infor-
matics, 50(0):46 – 61. Special Issue on Informatics
Methods in Medical Privacy.
Loukides, G., Liagouris, J., Gkoulalas-Divanis, A., and
Terrovitis, M. (2015). Utility-constrained electronic
health record data publishing through generalization
and disassociation. In Gkoulalas-Divanis, A. and
Loukides, G., editors, Medical Data Privacy Hand-
book, pages 149–177. Springer International Publish-
ing.
Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasub-
ramaniam, M. (2006). l-diversity: Privacy beyond k-
anonymity. In Proceedings of the 22nd IEEE Interna-
tional Conference on Data Engineering (ICDE 2006),
Atlanta Georgia.
Miller, G. A. (1995). Wordnet: A lexical database for en-
glish. Commun. ACM, 38(11):39–41.
Ressel, P. (1985). De Finetti-type theorems: an analytical
approach. Ann. Probab., 13(3):898–922.
Samarati, P. (2001). Protecting respondents’ identities in
microdata release. IEEE Trans. Knowl. Data Eng.,
13(6):1010–1027.
Sweeney, L. (2001). Computational disclosure control - a
primer on data privacy protection. Technical report,
Massachusetts Institute of Technology.
Sweeney, L. (2002). k-anonymity: a model for protecting
privacy. International Journal on Uncertainty, Fuzzi-
ness and Knowledge-based Systems, 10(5):557–570.
Terrovitis, M., Mamoulis, N., and Kalnis, P. (2008).
Privacy-preserving anonymization of set-valued data.
PVLDB, 1(1):115–125.
Terrovitis, M., Mamoulis, N., Liagouris, J., and Skiadopou-
los, S. (2012). Privacy preservation by disassociation.
Proc. VLDB Endow., 5(10):944–955.
Wong, R. C.-W., Fu, A. W.-C., Wang, K., and Pei, J. (2007).
Minimality attack in privacy preserving data publish-
ing. In VLDB, pages 543–554.
Wong, R. C.-W., Fu, A. W.-C., Wang, K., Yu, P. S., and Pei,
J. (2011). Can the utility of anonymized data be used
for privacy breaches? ACM Trans. Knowl. Discov.
Data, 5(3):16:1–16:24.
Xiao, X. and Tao, Y. (2006). Anatomy: Simple and effective
privacy preservation. In Proceedings of 32nd Interna-
tional Conference on Very Large Data Bases (VLDB
2006), Seoul, Korea.
SECRYPT 2016 - International Conference on Security and Cryptography
326