SlideShare a Scribd company logo
1 of 17
Classification of Data in a
Multidimensional Dataset
Protecting Quasi-Identifiers
• Masking EI alone is not sufficient, as an adversary can still
use QI to re-identify a record owner
• This linking is called record linkage where a record from a
database is linked with a record in an external data source.
There are two important aspects that need to be
considered while anonymizing QI:
• The analytical utility of QI needs to be preserved
• The correlation of QI attributes with sensitive data needs to
be maintained to support the utility of anonymized data
Challenges in Protecting QI
• Protection of QI is key to the success of any anonymization program,
especially with respect to multidimensional data.
The main challenges in anonymizing QI attributes are
• High dimensionality
• Background knowledge of the adversary
• Availability of external knowledge
• Correlation with SD to ensure utility
• Maintaining analytical utility
Challenge!
• Principle (6) offers guidance
Principle of data structure complexity—Anonymization design is
dependent on the data structure.
• Another important aspect to consider while anonymizing QI
attributes is that the correlation between QI and SD attributes must
be maintained.
• For example, in a life insurance application, the age of a policy holder
and the premium she pays for a particular insurance product are
correlated.
• Here, AGE is a QI attribute and PREMIUM is an SD attribute.
• Therefore, as part of the anonymization, it is important to maintain
this relationship between QI and SD attributes wherever applicable.
“Higher the age, higher the premium"
• Another aspect that needs to be looked into is the analytical utility of
anonymized QI attributes.
Table a) Anonymized
Table b) Anonymized
• How many employees with EDUCATION = “Doctorate” are part of this
company?
• Perturbative method is used in the above tables for anonymization.
• Perturbative techniques are generally referred to as masking and non-
perturbative techniques as anonymization.
• QI attributes are generally composed of a record owner’s
demographics, which are available in external data sources, such as a
voters database.
• It is indeed a challenge to anonymize QI attributes especially in the
presence of external data sources, protect outlier records, and
provide high utility.
• Principle (13) comes into play here.
• One of the techniques suggested is group-based anonymization
where data are anonymized in a group-specific manner. This
technique is called k-anonymization.
• k-anonymity achieves this through suppression and generalization of
identifiers.
Protecting Sensitive Data (SD)
• Data protection design ensures that EI are completely masked and QI
are anonymized, leaving out SD in original form as it is required for
analysis or as test data.
• As EI are completely masked, the transformed data make no sense
and are not useful for re-identification, and properly anonymized QI
also prevent re-identification.
• If sensitive data are in original form, then it provides a channel for re-
identification.
Example: Anonymized SD
• Even though the data have been randomly perturbed, they have been
ensured that the mean and covariance of the original table and
perturbed tables are the same.
• This means that the transformed table is still valid for analysis
rendering the data to be useful at the same time maintaining the
privacy of the data.

More Related Content

Similar to 11-Privacy Preserving Methods-20-02-2024 (1).pptx

Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
International Journal of Engineering Inventions www.ijeijournal.com
 
DATA MINING TOOL- ORANGE
DATA MINING TOOL- ORANGEDATA MINING TOOL- ORANGE
DATA MINING TOOL- ORANGE
Neeraj Goswami
 
Strategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data ArchitectureStrategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data Architecture
SandeepMaira
 

Similar to 11-Privacy Preserving Methods-20-02-2024 (1).pptx (20)

Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Burton - Security, Privacy and Trust
Burton - Security, Privacy and TrustBurton - Security, Privacy and Trust
Burton - Security, Privacy and Trust
 
Intro to Data Management
Intro to Data ManagementIntro to Data Management
Intro to Data Management
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
 
Dealing with Dark Data
Dealing with Dark DataDealing with Dark Data
Dealing with Dark Data
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for Insurance
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
Ch~2.pdf
Ch~2.pdfCh~2.pdf
Ch~2.pdf
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Strategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data ArchitectureStrategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data Architecture
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
 
DATA MINING TOOL- ORANGE
DATA MINING TOOL- ORANGEDATA MINING TOOL- ORANGE
DATA MINING TOOL- ORANGE
 
Data Mining Module 1 Business Analytics.
Data Mining Module 1 Business Analytics.Data Mining Module 1 Business Analytics.
Data Mining Module 1 Business Analytics.
 
Strategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data ArchitectureStrategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data Architecture
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

11-Privacy Preserving Methods-20-02-2024 (1).pptx

  • 1. Classification of Data in a Multidimensional Dataset
  • 2. Protecting Quasi-Identifiers • Masking EI alone is not sufficient, as an adversary can still use QI to re-identify a record owner • This linking is called record linkage where a record from a database is linked with a record in an external data source.
  • 3.
  • 4. There are two important aspects that need to be considered while anonymizing QI: • The analytical utility of QI needs to be preserved • The correlation of QI attributes with sensitive data needs to be maintained to support the utility of anonymized data
  • 5. Challenges in Protecting QI • Protection of QI is key to the success of any anonymization program, especially with respect to multidimensional data.
  • 6. The main challenges in anonymizing QI attributes are • High dimensionality • Background knowledge of the adversary • Availability of external knowledge • Correlation with SD to ensure utility • Maintaining analytical utility
  • 7. Challenge! • Principle (6) offers guidance Principle of data structure complexity—Anonymization design is dependent on the data structure.
  • 8. • Another important aspect to consider while anonymizing QI attributes is that the correlation between QI and SD attributes must be maintained. • For example, in a life insurance application, the age of a policy holder and the premium she pays for a particular insurance product are correlated.
  • 9. • Here, AGE is a QI attribute and PREMIUM is an SD attribute. • Therefore, as part of the anonymization, it is important to maintain this relationship between QI and SD attributes wherever applicable. “Higher the age, higher the premium" • Another aspect that needs to be looked into is the analytical utility of anonymized QI attributes.
  • 12. • How many employees with EDUCATION = “Doctorate” are part of this company? • Perturbative method is used in the above tables for anonymization.
  • 13. • Perturbative techniques are generally referred to as masking and non- perturbative techniques as anonymization. • QI attributes are generally composed of a record owner’s demographics, which are available in external data sources, such as a voters database. • It is indeed a challenge to anonymize QI attributes especially in the presence of external data sources, protect outlier records, and provide high utility. • Principle (13) comes into play here.
  • 14. • One of the techniques suggested is group-based anonymization where data are anonymized in a group-specific manner. This technique is called k-anonymization. • k-anonymity achieves this through suppression and generalization of identifiers.
  • 15. Protecting Sensitive Data (SD) • Data protection design ensures that EI are completely masked and QI are anonymized, leaving out SD in original form as it is required for analysis or as test data. • As EI are completely masked, the transformed data make no sense and are not useful for re-identification, and properly anonymized QI also prevent re-identification. • If sensitive data are in original form, then it provides a channel for re- identification.
  • 17. • Even though the data have been randomly perturbed, they have been ensured that the mean and covariance of the original table and perturbed tables are the same. • This means that the transformed table is still valid for analysis rendering the data to be useful at the same time maintaining the privacy of the data.