Flash: Efficient, stable and optimal k-anonymity

Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Alfons Kemper, Klaus A. Kuhn

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

74 Scopus citations

Abstract

K-anonymization is an important technique for the de-identification of sensitive datasets. In this paper, we briefly describe an implementation framework which has been carefully engineered to meet the needs of an important class of k-anonymity algorithms. We have implemented and evaluated two major well-known algorithms within this framework and show that it allows for highly efficient implementations. Regarding their runtime behaviour, we were able to closely reproduce the results from previous publications but also found some algorithmic limitations. Furthermore, we propose a new algorithm that achieves very good performance by implementing a novel strategy and exploiting different aspects of our implementation framework. In contrast to the current state-of-the-art, our algorithm offers algorithmic stability, with execution time being independent of the actual representation of the input data. Experiments with different real-world datasets show that our solution clearly outperforms the previous algorithms.

Original languageEnglish
Title of host publicationProceedings - 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, SocialCom/PASSAT 2012
Pages708-717
Number of pages10
DOIs
StatePublished - 2012
Event2012 ASE/IEEE International Conference on Social Computing, SocialCom 2012 and the 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2012 - Amsterdam, Netherlands
Duration: 3 Sep 20125 Sep 2012

Publication series

NameProceedings - 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, SocialCom/PASSAT 2012

Conference

Conference2012 ASE/IEEE International Conference on Social Computing, SocialCom 2012 and the 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2012
Country/TerritoryNetherlands
CityAmsterdam
Period3/09/125/09/12

Keywords

  • Algorithms
  • Anonymization
  • De-Identification
  • K-Anonymity
  • Performance
  • Privacy
  • Security

Fingerprint

Dive into the research topics of 'Flash: Efficient, stable and optimal k-anonymity'. Together they form a unique fingerprint.

Cite this