K-Anonymity

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6072099 Experts worldwide ranked by ideXlab platform

Riccardo Bettati - One of the best experts on this subject based on the ideXlab platform.

  • Information Leakage as a Model for Quality of Anonymity Networks
    IEEE Transactions on Parallel and Distributed Systems, 2009
    Co-Authors: Ye Zhu, Riccardo Bettati
    Abstract:

    Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are heterogeneous, as are the ways they are used, the deployed anonymity measures, and finally the possible attack methods. Implementation quality and topologies of the anonymity measures must be considered as well. We therefore propose a new measure for the anonymity degree, that takes into account these various. We model the effectiveness of single mixes or of mix networks in terms of information leakage, and we measure it in terms of covert channel capacity. The relationship between the anonymity degree and information leakage is described, and an example is shown.

  • ICDCS - Anonymity vs. Information Leakage in Anonymity Systems
    25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), 2005
    Co-Authors: Ye Zhu, Riccardo Bettati
    Abstract:

    Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are heterogeneous, as are the ways they are used, the deployed anonymity measures, and finally the possible attack methods. Implementation quality and topologies of the anonymity measures must be considered as well. We therefore propose a new measure for the anonymity degree, which takes into account possible heterogeneity. We model the effectiveness of single mixes or of mix networks in terms of information leakage and measure it in terms of covert channel capacity. The relationship between the anonymity degree and information leakage is described, and an example is shown

  • Anonymity v.s. Information Leakage in a Anonymity Systems
    2004
    Co-Authors: Ye Zhu, Riccardo Bettati
    Abstract:

    Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are heterogeneous, as are the ways they are used, the deployed anonymity measures, and finally the possible attack methods. Implementation quality and topologies of the anonymity measures must be considered as well. We therefore propose a new measure for the anonymity degree, which takes into account possible heterogeneity. We model the effectiveness of single mixes or of mix networks in terms of information leakage and measure it in terms of covert channel capacity. The relationship between the anonymity degree and information leakage is described, and an example is shown.

Traian Marius Truta - One of the best experts on this subject based on the ideXlab platform.

  • avoiding attribute disclosure with the extended p sensitive k anonymity model
    Data Mining, 2010
    Co-Authors: Traian Marius Truta, Alina Campan
    Abstract:

    Existing privacy regulations together with large amounts of available data created a huge interest in data privacy research. A main research direction is built around the K-Anonymity property. Several shortcomings of the K-Anonymity model were addressed by new privacy models such as p-sensitive K-Anonymity, l-diversity, (α,k)-anonymity, t-closeness. In this chapter we describe two algorithms (GreedyPKClustering and EnhancedPKClustering) for generating (extended) p-sensitive k-anonymous microdata. In our experiments, we compare the quality of generated microdata obtained with the mentioned algorithms and with another existing anonymization algorithm (Incognito). Also, we present two new branches of p-sensitive K-Anonymity, the constrained p-sensitive K-Anonymity model and the p-sensitive K-Anonymity model for social networks.

  • Secure Data Management - Generating microdata with p-sensitive K-Anonymity property
    Lecture Notes in Computer Science, 2007
    Co-Authors: Traian Marius Truta, Alina Campan, Paul Meyer
    Abstract:

    Existing privacy regulations together with large amounts of available data have created a huge interest in data privacy research. A main research direction is built around the K-Anonymity property. Several shortcomings of the K-Anonymity model have been fixed by new privacy models such as p-sensitive K-Anonymity, l-diversity, (α, k)-anonymity, and t-closeness. In this paper we introduce the Enhanced PK Clustering algorithm for generating p-sensitive k- anonymous microdata based on frequency distribution of sensitive attribute values. The p-sensitive K-Anonymity model and its enhancement, extended p- sensitive K-Anonymity, are described, their properties are presented, and two diversity measures are introduced. Our experiments have shown that the proposed algorithm improves several cost measures over existing algorithms.

  • privacy protection p sensitive k anonymity property
    International Conference on Data Engineering, 2006
    Co-Authors: Traian Marius Truta, B Vinay
    Abstract:

    In this paper, we introduce a new privacy protection property called p-sensitive K-Anonymity. The existing kanonymity property protects against identity disclosure, but it fails to protect against attribute disclosure. The new introduced privacy model avoids this shortcoming. Two necessary conditions to achieve p-sensitive kanonymity property are presented, and used in developing algorithms to create masked microdata with p-sensitive K-Anonymity property using generalization and suppression.

Michail Tsikerdekis - One of the best experts on this subject based on the ideXlab platform.

  • the effects of perceived anonymity and anonymity states on conformity and groupthink in online communities a wikipedia study
    Journal of the Association for Information Science and Technology, 2013
    Co-Authors: Michail Tsikerdekis
    Abstract:

    Groupthink behavior is always a risk in online groups and group decision support systems (GDSS), especially when not all potential alternatives for problem resolution are considered. It becomes a reality when individuals simply conform to the majority opinion and hesitate to suggest their own solutions to a problem. Anonymity has long been established to have an effect on conformity, but no previous research has explored the effects of different anonymity states in relation to an individual's likelihood to conform. Through a survey of randomly chosen participants from the English-language Wikipedia community, I explored the effects of anonymity on the likelihood of conforming to group opinion. In addition, I differentiated between actual states of anonymity and individuals' perceptions of anonymity. His findings indicate that although people perceive anonymity differently depending on their anonymity state, different states of anonymity do not have a strong effect on the likelihood of conforming to group opinion. Based on this evidence, I make recommendations for software engineers who have a direct hand in the design of online community platforms.

  • The effects of perceived anonymity and anonymity states onconformity and groupthink in online communities: A Wikipediastudy
    2013
    Co-Authors: Michail Tsikerdekis
    Abstract:

    Groupthink behavior is always a risk in online groups and group decision support systems (GDSS), especially when not all potential alternatives for problem resolution are considered. It becomes a reality when individuals simply conform to the majority opinion and hesitate to suggest their own solutions to a problem. Anonymity has long been established to have an effect on conformity, but no previous research has explored the effects of different anonymity states in relation to an individual's likelihood to conform. Through a survey of randomly chosen participants from the English-language Wikipedia community, I explored the effects of anonymity on the likelihood of conforming to group opinion. In addition, I differentiated between actual states of anonymity and individuals' perceptions of anonymity. His findings indicate that although people perceive anonymity differently depending on their anonymity state, different states of anonymity do not have a strong effect on the likelihood of conforming to group opinion. Based on this evidence, I make recommendations for software engineers who have a direct hand in the design of online community platforms.

  • engineering anonymity to reduce aggression online
    2011
    Co-Authors: Michail Tsikerdekis
    Abstract:

    The effects of anonymity on aggression have been discussed by many social scientists in the past years. Anonymity is a factor that could lead to disinhibited behavior which could damage many online communities. This knowledge provides software engineers with a dilemma as to whether to use anonymity as an option for their users and suffer the increased aggression that their community might exhibit or exclude it all together. In order to cope with the increased aggression that might occur due to the presence of anonymity, most of the developers employ moderators to do policing work. This paper argues that there is a gap in the knowledge that we have about anonymity and aggression. Anonymity is a generic term and should be analyzed further into different states such as pseudonymity and complete anonymity. There is no knowledge covering the effects of these two different states of anonymity in the interactions of users in relevance to aggression. This paper shows that according to previous work there is enough evidence to support that there may be a difference. If this is true, software engineers might have another option for decreasing aggression by altering the design, instead of moderating their communities.

Ye Zhu - One of the best experts on this subject based on the ideXlab platform.

  • Information Leakage as a Model for Quality of Anonymity Networks
    IEEE Transactions on Parallel and Distributed Systems, 2009
    Co-Authors: Ye Zhu, Riccardo Bettati
    Abstract:

    Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are heterogeneous, as are the ways they are used, the deployed anonymity measures, and finally the possible attack methods. Implementation quality and topologies of the anonymity measures must be considered as well. We therefore propose a new measure for the anonymity degree, that takes into account these various. We model the effectiveness of single mixes or of mix networks in terms of information leakage, and we measure it in terms of covert channel capacity. The relationship between the anonymity degree and information leakage is described, and an example is shown.

  • ICDCS - Anonymity vs. Information Leakage in Anonymity Systems
    25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), 2005
    Co-Authors: Ye Zhu, Riccardo Bettati
    Abstract:

    Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are heterogeneous, as are the ways they are used, the deployed anonymity measures, and finally the possible attack methods. Implementation quality and topologies of the anonymity measures must be considered as well. We therefore propose a new measure for the anonymity degree, which takes into account possible heterogeneity. We model the effectiveness of single mixes or of mix networks in terms of information leakage and measure it in terms of covert channel capacity. The relationship between the anonymity degree and information leakage is described, and an example is shown

  • Anonymity v.s. Information Leakage in a Anonymity Systems
    2004
    Co-Authors: Ye Zhu, Riccardo Bettati
    Abstract:

    Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are heterogeneous, as are the ways they are used, the deployed anonymity measures, and finally the possible attack methods. Implementation quality and topologies of the anonymity measures must be considered as well. We therefore propose a new measure for the anonymity degree, which takes into account possible heterogeneity. We model the effectiveness of single mixes or of mix networks in terms of information leakage and measure it in terms of covert channel capacity. The relationship between the anonymity degree and information leakage is described, and an example is shown.

Wang Neng - One of the best experts on this subject based on the ideXlab platform.

  • Survey of anonymity communication
    Journal of Computer Applications, 2010
    Co-Authors: Wang Neng
    Abstract:

    Anonymity communication is a hot topic in the area of network and communication.The origin of anonymity communication was first outlined,and the framework of anonymity communication in terms of anonymity property,adversary capability and network type were described.Then the research of anonymity communication was investigated,and a brief description of several major anonymity communication systems including Anonymizer,Tor,Mixminion,Crowds and Tarzan was provided.Finally the challenges confronted in the development of anonymity communication were proposed,including the user experience of anonymity communication,credibility evaluation system of relay node and misbehavior of anonymity communication.