{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:20:07Z","timestamp":1761956407203,"version":"build-2065373602"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2009,6,1]],"date-time":"2009-06-01T00:00:00Z","timestamp":1243814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee, Hong Kong","doi-asserted-by":"publisher","award":["DAG08\/09.EG01"],"award-info":[{"award-number":["DAG08\/09.EG01"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Database Syst."],"published-print":{"date-parts":[[2009,6]]},"abstract":"<jats:p>\n            Data publishing generates much concern over the protection of individual privacy. Recent studies consider cases where the adversary may possess different kinds of knowledge about the data. In this article, we show that knowledge of the mechanism or algorithm of anonymization for data publication can also lead to extra information that assists the adversary and jeopardizes individual privacy. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. We call such an attack a minimality attack. In this article, we introduce a model called\n            <jats:italic>m<\/jats:italic>\n            -confidentiality which deals with minimality attacks, and propose a feasible solution. Our experiments show that minimality attacks are practical concerns on real datasets and that our algorithm can prevent such attacks with very little overhead and information loss.\n          <\/jats:p>","DOI":"10.1145\/1538909.1538910","type":"journal-article","created":{"date-parts":[[2009,6,30]],"date-time":"2009-06-30T13:10:17Z","timestamp":1246367417000},"page":"1-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Anonymization-based attacks in privacy-preserving data publishing"],"prefix":"10.1145","volume":"34","author":[{"given":"Raymond Chi-Wing","family":"Wong","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong"}]},{"given":"Ada Wai-Chee","family":"Fu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong"}]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Burnaby, BC, Canada"}]},{"given":"Jian","family":"Pei","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Burnaby, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2009,7,2]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_17"},{"key":"e_1_2_2_2_1","unstructured":"]]Aggarwal G. Feder T. Kenthapadi K. Motwani R. Panigrahy R. Thomas D. and Zhu A. 2005b. Approximation algorithms for k-anonymity. J. Privacy Technol.  ]]Aggarwal G. Feder T. Kenthapadi K. Motwani R. Panigrahy R. Thomas D. and Zhu A. 2005b. Approximation algorithms for k-anonymity. J. Privacy Technol."},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_2_2_4_1","unstructured":"]]Blake E. K. C. and Merz C. J. 1998. UCI repository of machine learning databases. http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html.  ]]Blake E. K. C. and Merz C. J. 1998. UCI repository of machine learning databases. http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html."},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Brumley D.","key":"e_1_2_2_5_1"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453948"},{"key":"e_1_2_2_7_1","doi-asserted-by":"crossref","unstructured":"]]Ciriani V. Vimercati S. D. C. D. Foresti S. and Samarati P. 2007. k-Anonymity. In Security in Decentralized Data Management.  ]]Ciriani V. Vimercati S. D. C. D. Foresti S. and Samarati P. 2007. k-Anonymity. In Security in Decentralized Data Management.","DOI":"10.1007\/978-0-387-27696-0_10"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775080"},{"volume-title":"Proceedings of the 13th International Joint Conference on Artificial Intelligence (IJCAI'93)","author":"Fayyad U. M.","key":"e_1_2_2_9_1"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"e_1_2_2_11_1","unstructured":"]]Garey M. and Johnson D. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman.   ]]Garey M. and Johnson D. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/0210054"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142499"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1386118.1386123"},{"volume-title":"Proceedings of the International Conference on Data Engineering (ICDE).","author":"Li N.","key":"e_1_2_2_18_1"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497453"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"volume-title":"Proceedings of the International Conference on Data Engineering (ICDE).","author":"Martin D. J.","key":"e_1_2_2_21_1"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1748-720X.1997.tb01885.x"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150449"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1236480.1236483"},{"volume-title":"Proceedings of the IEEE International Conference on Data Mining (ICDM'04)","author":"Wang K.","key":"e_1_2_2_30_1"},{"volume-title":"Proceedings of the International Conference on Very Large Databases (VLDB).","author":"Wong R.","key":"e_1_2_2_31_1"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"volume-title":"Proceedings of the International Conference on Very Large Databases (VLDB).","author":"Xiao X.","key":"e_1_2_2_33_1"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142500"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150504"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315316"},{"volume-title":"Proceedings of the International Conference on Data Engineering (ICDE'07)","author":"Zhang Q.","key":"e_1_2_2_38_1"}],"container-title":["ACM Transactions on Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1538909.1538910","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1538909.1538910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:53Z","timestamp":1750278413000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1538909.1538910"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["10.1145\/1538909.1538910"],"URL":"https:\/\/doi.org\/10.1145\/1538909.1538910","relation":{},"ISSN":["0362-5915","1557-4644"],"issn-type":[{"type":"print","value":"0362-5915"},{"type":"electronic","value":"1557-4644"}],"subject":[],"published":{"date-parts":[[2009,6]]},"assertion":[{"value":"2008-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}