Model for a Common Notion of Privacy Leakage on Public
Database
Shinsaku Kiyomoto1 and Keith M. Martin2
1KDDI R&D
Laboratories, Inc.
2-1-15 Ohara, Fujimino, Saitama
356-8502, Japan
kiyomoto@kddilabs.jp
2Information
Security Group,
Royal Holloway University of London
Egham, Surrey TW20 0EX, UK
keith.martin@rhul.ac.uk
Abstract
Privacy is an increasingly important aspect of data
publishing services.
If personal private information is leaked from the data,
the service will be regarded
as unacceptable by the original owners of the data. Two different approaches
to defining a notion of database privacy, the generalization method and the
perturbation method,
have been independently studied. These two approaches have significantly
differences,
making it hard to compare related research. In this paper, we propose a unified
model
that is based on the perturbation method, but which is applicable to
generalized data sets.
In particular, this model applies the notion of
differential privacy to data sets that satisfy k-anonymity.
We demonstrate this approach through a simple case study.
This is a first step towards a common
notion for protecting database privacy
Keywords: privacy leakage, database privacy, perturbation method
Journal of Wireless Mobile Networks,
Ubiquitous Computing, and Dependable Applications (JoWUA),
Vol. 2, No. 1, pp. 50-62, June 2011 [pdf]