{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:35Z","timestamp":1750220675192,"version":"3.41.0"},"reference-count":61,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T00:00:00Z","timestamp":1611187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2021,5,31]]},"abstract":"<jats:p>The ability to measure privacy accurately and consistently is key in the development of new privacy protections. However, recent studies have uncovered weaknesses in existing privacy metrics, as well as weaknesses caused by the use of only a single privacy metric. Metrics suites, or combinations of privacy metrics, are a promising mechanism to alleviate these weaknesses, if we can solve two open problems: which metrics should be combined and how. In this article, we tackle the first problem, i.e., the selection of metrics for strong metrics suites, by formulating it as a knapsack optimization problem with both single and multiple objectives. Because solving this problem exactly is difficult due to the large number of combinations and many qualities\/objectives that need to be evaluated for each metrics suite, we apply 16 existing evolutionary and metaheuristic optimization algorithms. We solve the optimization problem for three privacy application domains: genomic privacy, graph privacy, and vehicular communications privacy. We find that the resulting metrics suites have better properties, i.e., higher monotonicity, diversity, evenness, and shared value range, than previously proposed metrics suites.<\/jats:p>","DOI":"10.1145\/3439405","type":"journal-article","created":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T11:31:58Z","timestamp":1611228718000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Designing Strong Privacy Metrics Suites Using Evolutionary Optimization"],"prefix":"10.1145","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0242-6278","authenticated-orcid":false,"given":"Isabel","family":"Wagner","sequence":"first","affiliation":[{"name":"De Montfort University, Leicester, UK"}]},{"given":"Iryna","family":"Yevseyeva","sequence":"additional","affiliation":[{"name":"De Montfort University, Leicester, UK"}]}],"member":"320","published-online":{"date-parts":[[2021,1,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_7"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Thomas B\u00e4ck. 2000. Evolutionary Computation 2: Advanced Algorithms and Operators. Taylor 8 Francis Ltd. Thomas B\u00e4ck. 2000. Evolutionary Computation 2: Advanced Algorithms and Operators. Taylor 8 Francis Ltd.","DOI":"10.1201\/9781420034349"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Thomas B\u00e4ck D. B. Fogel and Z. Michalewicz. 2000. Evolutionary Computation 1: Basic Algorithms and Operators (1st ed.). CRC Press. Thomas B\u00e4ck D. B. Fogel and Z. Michalewicz. 2000. Evolutionary Computation 1: Basic Algorithms and Operators (1st ed.). CRC Press.","DOI":"10.1201\/9781420034349"},{"volume-title":"EVOLVE\u2014A Bridge between Probability","author":"Basto-Fernandes Vitor","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","first-page":"183","article-title":"A survey of quantification of privacy preserving data mining algorithms. In Privacy-Preserving Data Mining: Models and Algorithms. Number 34 in Advances in Database Systems. Springer","volume":"8","author":"Bertino Elisa","year":"2008","journal-title":"Chapter"},{"volume-title":"Parallel Problem Solving from Nature\u2014PPSN X (Lecture Notes in Computer Science)","author":"Beyer Hans-Georg","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","first-page":"10","article-title":"Esa\/Pagmo2","volume":"2","author":"Biscani Francesco","year":"2019","journal-title":"Pagmo"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Julian Blank and Kalyanmoy Deb. 2019. Pymoo\u2014Multi-Objective Optimization in Python. Retrieved from https:\/\/pymoo.org. Julian Blank and Kalyanmoy Deb. 2019. Pymoo\u2014Multi-Objective Optimization in Python. Retrieved from https:\/\/pymoo.org.","DOI":"10.1109\/ACCESS.2020.2990567"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281535"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"volume-title":"Number 2482 in Lecture Notes in Computer Science","author":"Diaz Claudia","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314347"},{"volume-title":"Readjusting the privacy goals in vehicular ad-hoc networks: A safety-preserving solution using non-overlapping time-slotted pseudonym pools. Comput. Commun. 122 (June","year":"2018","author":"Eckhoff David","key":"e_1_2_1_14_1"},{"volume-title":"Evolutionary Multi-Criterion Optimization","author":"Emmerich Michael","key":"e_1_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-27250-9"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2503308.2503311"},{"volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"Goldberg David E.","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","unstructured":"David Hadka. 2019. A Free and Open Source Python Library for Multiobjective Optimization: Project-Platypus\/Platypus. Retrieved from https:\/\/github.com\/Project-Platypus\/Platypus. David Hadka. 2019. A Free and Open Source Python Library for Multiobjective Optimization: Project-Platypus\/Platypus. Retrieved from https:\/\/github.com\/Project-Platypus\/Platypus."},{"volume-title":"Technical Report IMM Technical Report IMMREP1998-7","author":"Hansen M. P.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1996.542381"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1162\/106365601750190398"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7295484"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1162\/evco.2007.15.1.1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281534"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"volume-title":"Knapsack Problems","author":"Kellerer Hans","key":"e_1_2_1_26_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24777-7"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the International Conference on Neural Networks (ICNN\u201995)","volume":"4","author":"Kennedy J.","year":"1942"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the IEEE Congress on Evolutionary Computation","volume":"1","author":"Kukkonen S.","year":"2005"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1162\/106365602760234108"},{"key":"e_1_2_1_30_1","unstructured":"Marco Laumanns Lothar Thiele and Eckart Zitzler. 2001. SPEA2: Improving the Strength Pareto Evolutionary Algorithm. TIK-Report 103. Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich (ETH). Marco Laumanns Lothar Thiele and Eckart Zitzler. 2001. SPEA2: Improving the Strength Pareto Evolutionary Algorithm. TIK-Report 103. Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich (ETH)."},{"edition":"3","volume-title":"Simulation Modelling and Analysis","author":"Law Averill M.","key":"e_1_2_1_31_1"},{"volume-title":"Evolutionary Multi-Criterion Optimization.","author":"Li Longmei","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300148"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(99)00260-X"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/98124"},{"volume-title":"Nonlinear Multiobjective Optimization","author":"Miettinen Kaisa","key":"e_1_2_1_36_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5563-6"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.145"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"volume-title":"Proceedings of the IEEE Symposium on Computational Intelligence in Milti-Criteria Decision-Making. IEEE, 66--73","year":"2009","author":"Nebro A. J.","key":"e_1_2_1_39_1"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/7.4.308"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134004"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.101.2.357"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"volume-title":"Coello Coello","year":"2005","author":"Sierra Margarita Reyes","key":"e_1_2_1_46_1"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1023\/a:1008202821328"},{"volume-title":"Proceedings of the 17th International Workshop on Security Protocols (LNCS 7028)","year":"2013","author":"Syverson Paul","key":"e_1_2_1_48_1"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470496916"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/2875383.2875384"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3157-6"},{"volume-title":"Van Veldhuizen and Gary B. Lamont","year":"1998","author":"David","key":"e_1_2_1_52_1"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3020003"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"e_1_2_1_55_1","unstructured":"Isabel Wagner and Iryna Yevseyeva. 2020. Privacy Metrics Suites for Genomic Privacy Vehicular Communications Privacy and Graph Privacy (Version 1.0.0) [Data set]. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.3350563 Isabel Wagner and Iryna Yevseyeva. 2020. Privacy Metrics Suites for Genomic Privacy Vehicular Communications Privacy and Graph Privacy (Version 1.0.0) [Data set]. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.3350563"},{"volume-title":"Evoalgos: Modular Evolutionary Algorithms.","year":"2017","author":"Wessing Simon","key":"e_1_2_1_56_1"},{"volume":"8672","volume-title":"Proceedings of the Conference on Parallel Problem Solving from Nature (PPSN\u201914)","author":"Yevseyeva Iryna","key":"e_1_2_1_57_1"},{"key":"e_1_2_1_58_1","first-page":"6","article-title":"MOEA\/D: A multiobjective evolutionary algorithm based on decomposition","volume":"11","author":"Zhang Q.","year":"2007","journal-title":"IEEE Trans. Evolution. Comput."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2830359"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2980271"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30217-9_84"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0056872"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.797969"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3439405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3439405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:08Z","timestamp":1750197788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3439405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,21]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,5,31]]}},"alternative-id":["10.1145\/3439405"],"URL":"https:\/\/doi.org\/10.1145\/3439405","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2021,1,21]]},"assertion":[{"value":"2020-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}