A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners
|Title:||A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners||Authors:||Ayala-Rivera, Vanessa; McDonagh, Patrick; Cerqueus, Thomas; Murphy, Liam, B.E.||Permanent link:||http://hdl.handle.net/10197/9109||Date:||2014||Online since:||2017-12-14T10:11:21Z||Abstract:||The vast amount of data being collected about individuals has brought new challenges in protecting their privacy when this data is disseminated. As a result, Privacy-Preserving Data Publishing has become an active research area, in which multiple anonymization algorithms have been proposed. However, given the large number of algorithms available and limited information regarding their performance, it is difficult to identify and select the most appropriate algorithm given a particular publishing scenario, especially for practitioners. In this paper, we perform a systematic comparison of three well-known k-anonymization algorithms to measure their efficiency (in terms of resources usage) and their effectiveness (in terms of data utility). We extend the scope of their original evaluation by employing a more comprehensive set of scenarios: different parameters, metrics and datasets. Using publicly available implementations of those algorithms, we conduct a series of experiments and a comprehensive analysis to identify the factors that influence their performance, in order to guide practitioners in the selection of an algorithm. We demonstrate through experimental evaluation, the conditions in which one algorithm outperforms the others for a particular metric, depending on the input dataset and privacy requirements. Our findings motivate the necessity of creating methodologies that provide recommendations about the best algorithm given a particular publishing scenario.||Funding Details:||Science Foundation Ireland||Type of material:||Journal Article||Publisher:||Transactions on Data Privacy||Journal:||Transactions on Data Privacy||Volume:||7||Issue:||3||Start page:||337||End page:||370||Copyright (published version):||2014 the Authors||Keywords:||Privacy-preserving data publishing; k-Anonymity; Algorithms; Performance||Other versions:||http://www.tdp.cat/issues11/abs.a169a14.php||Language:||en||Status of Item:||Peer reviewed||ISSN:||1888-5063||This item is made available under a Creative Commons License:||https://creativecommons.org/licenses/by-nc-nd/3.0/ie/|
|Appears in Collections:||Computer Science Research Collection|
Show full item record
If you are a publisher or author and have copyright concerns for any item, please email email@example.com and the item will be withdrawn immediately. The author or person responsible for depositing the article will be contacted within one business day.