{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T06:36:12Z","timestamp":1673591772187},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2009,8]]},"abstract":"<jats:p>\n            Before sharing to support ad hoc aggregate analyses, microdata often need to be anonymized to protect the privacy of individuals. A variety of privacy models have been proposed for microdata anonymization. Many of these models (e.g.,\n            <jats:italic>t<\/jats:italic>\n            -closeness) essentially require that, after anonymization, groups of sensitive attribute values follow specified distributions. To support such models, in this paper we study the problem of transforming a group of sensitive attribute values to follow a certain target distribution with minimal data distortion. Specifically, we develop and evaluate a novel methodology that combines the use of sensitive attribute permutation and generalization with the addition of fake sensitive attribute values to achieve this transformation. We identify metrics related to accuracy of aggregate query answers over the transformed data, and develop efficient anonymization algorithms to optimize these accuracy metrics. Using a variety of data sets, we experimentally demonstrate the effectiveness of our techniques.\n          <\/jats:p>","DOI":"10.14778\/1687627.1687735","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T12:17:57Z","timestamp":1403612277000},"page":"958-969","source":"Crossref","is-referenced-by-count":6,"title":["Distribution based microdata anonymization"],"prefix":"10.14778","volume":"2","author":[{"given":"Nick","family":"Koudas","sequence":"first","affiliation":[{"name":"University of Toronto"}]},{"given":"Divesh","family":"Srivastava","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs--Research"}]},{"given":"Ting","family":"Yu","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Qing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Teradata"}]}],"member":"320","published-online":{"date-parts":[[2009,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401904"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_4"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453947"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453873"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367858"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_2_1_10_1","first-page":"51","volume-title":"Journal of the American Medical Informatics Association","author":"Sweeney L.","year":"1997","unstructured":"L. Sweeney . Guaranteeing anonymity when sharing medical data, the datafly system . Journal of the American Medical Informatics Association , pages 51 -- 55 , 1997 . L. Sweeney. Guaranteeing anonymity when sharing medical data, the datafly system. Journal of the American Medical Informatics Association, pages 51--55, 1997."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_2_1_12_1","unstructured":"U. C. Irvin Machine Learning Repository. http:\/\/www.ics.uci.edu\/~mlearn\/mlrepository.html.  U. C. Irvin Machine Learning Repository. http:\/\/www.ics.uci.edu\/~mlearn\/mlrepository.html."},{"key":"e_1_2_1_13_1","volume-title":"VLDB","author":"Xiao X.","year":"2006","unstructured":"X. Xiao and Y. Tao . Anatomy: simple and effective privacy preservation . In VLDB , 2006 . X. Xiao and Y. Tao. Anatomy: simple and effective privacy preservation. In VLDB, 2006."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367857"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/1687627.1687735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T11:34:07Z","timestamp":1672227247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/1687627.1687735"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["10.14778\/1687627.1687735"],"URL":"https:\/\/doi.org\/10.14778\/1687627.1687735","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2009,8]]}}}