Enhancing data utility in differential privacy via microaggregation-based -anonymity

J Soria-Comas, J Domingo-Ferrer, D Sánchez… - The VLDB Journal, 2014 - Springer
It is not uncommon in the data anonymization literature to oppose the “old” k k-anonymity
model to the “new” differential privacy model, which offers more robust privacy guarantees …

Utility-preserving differentially private data releases via individual ranking microaggregation

D Sánchez, J Domingo-Ferrer, S Martínez… - Information …, 2016 - Elsevier
Being able to release and exploit open data gathered in information systems is crucial for
researchers, enterprises and the overall society. Yet, these data must be anonymized before …

On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy

N Li, W Qardaji, D Su - Proceedings of the 7th ACM Symposium on …, 2012 - dl.acm.org
This paper aims at answering the following two questions in privacy-preserving data
analysis and publishing. The first is: What formal privacy guarantee (if any) does k …

[PDF][PDF] Provably private data anonymization: Or, k-anonymity meets differential privacy

N Li, WH Qardaji, D Su - CoRR, abs/1101.2604, 2011 - cerias.purdue.edu
Privacy-preserving microdata publishing currently lacks a solid theoretical foundation. Most
existing techniques are developed to satisfy syntactic privacy notions such as k-anonymity …

t-closeness through microaggregation: Strict privacy with enhanced utility preservation

J Soria-Comas, J Domingo-Ferrer… - … on Knowledge and …, 2015 - ieeexplore.ieee.org
Microaggregation is a technique for disclosure limitation aimed at protecting the privacy of
data subjects in microdata releases. It has been used as an alternative to generalization and …

Non-interactive differential privacy: a survey

D Leoni - Proceedings of the First International Workshop on …, 2012 - dl.acm.org
OpenData movement around the globe is demanding more access to information which lies
locked in public or private servers. As recently reported by a McKinsey publication, this data …

Publishing set-valued data via differential privacy

R Chen, N Mohammed, BCM Fung, BC Desai… - Proceedings of the …, 2011 - dl.acm.org
Set-valued data provides enormous opportunities for various data mining tasks. In this
paper, we study the problem of publishing set-valued data for data mining tasks under the …

Differential privacy via t-closeness in data publishing

J Soria-Comas… - 2013 Eleventh Annual …, 2013 - ieeexplore.ieee.org
k-Anonymity and e-differential privacy are two main privacy models proposed within the
computer science community. Whereas the former was proposed for privacy-preserving data …

From t-closeness to differential privacy and vice versa in data anonymization

J Domingo-Ferrer, J Soria-Comas - Knowledge-Based Systems, 2015 - Elsevier
Abstract k-anonymity and ε-differential privacy are two mainstream privacy models, the
former introduced to anonymize data sets and the latter to limit the knowledge gain that …

Differential privacy in data publication and analysis

Y Yang, Z Zhang, G Miklau, M Winslett… - Proceedings of the 2012 …, 2012 - dl.acm.org
Data privacy has been an important research topic in the security, theory and database
communities in the last few decades. However, many existing studies have restrictive …