{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:07:25Z","timestamp":1763968045859,"version":"3.41.0"},"reference-count":33,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000089","name":"Office of International Science and Engineering","doi-asserted-by":"publisher","award":["IIS-0914934OISE-0968341OIA-0963278"],"award-info":[{"award-number":["IIS-0914934OISE-0968341OIA-0963278"]}],"id":[{"id":"10.13039\/100000089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0914934OISE-0968341OIA-0963278"],"award-info":[{"award-number":["IIS-0914934OISE-0968341OIA-0963278"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000106","name":"Office of Integrative Activities","doi-asserted-by":"publisher","award":["IIS-0914934OISE-0968341OIA-0963278"],"award-info":[{"award-number":["IIS-0914934OISE-0968341OIA-0963278"]}],"id":[{"id":"10.13039\/100000106","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee, Hong Kong","doi-asserted-by":"publisher","award":["GRF 621309"],"award-info":[{"award-number":["GRF 621309"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2011,8]]},"abstract":"<jats:p>\n            Group based anonymization is the most widely studied approach for privacy-preserving data publishing. Privacy models\/definitions using group based anonymization includes\n            <jats:italic>k<\/jats:italic>\n            -anonymity,\n            <jats:italic>l<\/jats:italic>\n            -diversity, and\n            <jats:italic>t<\/jats:italic>\n            -closeness, to name a few. The goal of this article is to raise a fundamental issue regarding the privacy exposure of the approaches using group based anonymization. This has been overlooked in the past. The group based anonymization approach by bucketization basically hides each individual record behind a group to preserve data privacy. If not properly anonymized, patterns can actually be derived from the published data and be used by an adversary to breach individual privacy. For example, from the medical records released, if patterns such as that people from certain countries rarely suffer from some disease can be derived, then the information can be used to imply linkage of other people in an anonymized group with this disease with higher likelihood. We call the derived patterns from the published data the foreground knowledge. This is in contrast to the background knowledge that the adversary may obtain from other channels, as studied in some previous work. Finally, our experimental results show such an attack is realistic in the privacy benchmark dataset under the traditional group based anonymization approach.\n          <\/jats:p>","DOI":"10.1145\/1993077.1993080","type":"journal-article","created":{"date-parts":[[2011,8,10]],"date-time":"2011-08-10T16:16:22Z","timestamp":1312992982000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Can the Utility of Anonymized Data be Used for Privacy Breaches?"],"prefix":"10.1145","volume":"5","author":[{"given":"Raymond Chi-Wing","family":"Wong","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology"}]},{"given":"Ada Wai-Chee","family":"Fu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[{"name":"Simon Fraser University"}]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago"}]},{"given":"Jian","family":"Pei","sequence":"additional","affiliation":[{"name":"Simon Fraser University"}]}],"member":"320","published-online":{"date-parts":[[2011,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497447"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150460"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_17"},{"volume-title":"Proceedings of the International Conference on Data Engineering (ICDE). 606--615","author":"Antova L.","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","unstructured":"Blake E. K. C. and Merz C. J. 1998. UCI repository of machine learning databases. http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html. Blake E. K. C. and Merz C. J. 1998. UCI repository of machine learning databases. http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401904"},{"volume-title":"Proceedings of the International Conference on Very Large Databases (VLDB). 123--144","author":"Burdick D.","key":"e_1_2_1_7_1"},{"volume-title":"Proceedings of the International Conference on Very Large Databases (VLDB). 39--50","author":"Burdick D.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","unstructured":"Chapra S. C. and Canale R. P. 2002. Numerical Methods for Engineers. McGraw-Hill 4th ed. Chapra S. C. and Canale R. P. 2002. Numerical Methods for Engineers. McGraw-Hill 4th ed."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497506"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401926"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1634.1886"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559861"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142499"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"volume-title":"Proceedings of the International Conference on Data Engineering (ICDE). 106--115","author":"Li N.","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497453"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.86"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"volume-title":"Proceedings of the International Conference on Data Engineering (ICDE). 126--135","author":"Martin D. J.","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.147"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253327"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"volume-title":"Proceedings of the International Conference on Very Large Databases (VLDB). 134--145","year":"1996","author":"Toivonen H.","key":"e_1_2_1_25_1"},{"volume-title":"Proceedings of the IEEE International Conference on Data Mining (ICDM). 249--256","author":"Wang K.","key":"e_1_2_1_26_1"},{"volume-title":"Proceedings of the International Conference on Very Large Databases (VLDB). 543--554","author":"Wong R.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.18"},{"volume-title":"Proceedings of the International Conference on Very Large Databases (VLDB). 139--150","author":"Xiao X.","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"volume-title":"Proceedings of the International Conference on Data Engineering (ICDE). 116--125","author":"Zhang Q.","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.97"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993077.1993080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993077.1993080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:05:45Z","timestamp":1750244745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993077.1993080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["10.1145\/1993077.1993080"],"URL":"https:\/\/doi.org\/10.1145\/1993077.1993080","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"type":"print","value":"1556-4681"},{"type":"electronic","value":"1556-472X"}],"subject":[],"published":{"date-parts":[[2011,8]]},"assertion":[{"value":"2009-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}