A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners
Files in This Item:
|SystematicComparisonAnonymAlgs.pdf||8.29 MB||Adobe PDF||Download|
|Title:||A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners||Authors:||Ayala-Rivera, Vanessa; McDonagh, Patrick; Cerqueus, Thomas; Murphy, Liam, B.E.||Permanent link:||http://hdl.handle.net/10197/9109||Date:||2014||Online since:||2017-12-14T10:11:21Z||Abstract:||The vast amount of data being collected about individuals has brought new challenges in protecting their privacy when this data is disseminated. As a result, Privacy-Preserving Data Publishing has become an active research area, in which multiple anonymization algorithms have been proposed. However, given the large number of algorithms available and limited information regarding their performance, it is difficult to identify and select the most appropriate algorithm given a particular publishing scenario, especially for practitioners. In this paper, we perform a systematic comparison of three well-known k-anonymization algorithms to measure their efficiency (in terms of resources usage) and their effectiveness (in terms of data utility). We extend the scope of their original evaluation by employing a more comprehensive set of scenarios: different parameters, metrics and datasets. Using publicly available implementations of those algorithms, we conduct a series of experiments and a comprehensive analysis to identify the factors that influence their performance, in order to guide practitioners in the selection of an algorithm. We demonstrate through experimental evaluation, the conditions in which one algorithm outperforms the others for a particular metric, depending on the input dataset and privacy requirements. Our findings motivate the necessity of creating methodologies that provide recommendations about the best algorithm given a particular publishing scenario.||Funding Details:||Science Foundation Ireland||Type of material:||Journal Article||Publisher:||Transactions on Data Privacy||Journal:||Transactions on Data Privacy||Volume:||7||Issue:||3||Start page:||337||End page:||370||Copyright (published version):||2014 the Authors||Keywords:||Privacy-preserving data publishing; k-Anonymity; Algorithms; Performance||Other versions:||http://www.tdp.cat/issues11/abs.a169a14.php||Language:||en||Status of Item:||Peer reviewed|
|Appears in Collections:||Computer Science Research Collection|
Show full item record
This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.