{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T01:17:59Z","timestamp":1760231879129,"version":"build-2065373602"},"reference-count":48,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T00:00:00Z","timestamp":1652140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Preserving confidentiality of individuals in data disclosure is a prime concern for public and private organizations. The main challenge in the data disclosure problem is to release data such that misuse by intruders is avoided while providing useful information to legitimate users for analysis. We propose an information theoretic architecture for the data disclosure problem. The proposed framework consists of developing a maximum entropy (ME) model based on statistical information of the actual data, testing the adequacy of the ME model, producing disclosure data from the ME model and quantifying the discrepancy between the actual and the disclosure data. The architecture can be used both for univariate and multivariate data disclosure. We illustrate the implementation of our approach using financial data.<\/jats:p>","DOI":"10.3390\/e24050670","type":"journal-article","created":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T08:31:55Z","timestamp":1652171515000},"page":"670","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Architecture for Data Disclosure"],"prefix":"10.3390","volume":"24","author":[{"given":"Kurt A.","family":"Pflughoeft","sequence":"first","affiliation":[{"name":"School of Business and Economics, University of Wisconsin-Stevens Point, Stevens Point, WI 54481, USA"}]},{"given":"Ehsan S.","family":"Soofi","sequence":"additional","affiliation":[{"name":"Sheldon B. Lubar School of Business, University of Wisconsin-Milwaukee, Milwaukee, WI 53211, USA"}]},{"given":"Refik","family":"Soyer","sequence":"additional","affiliation":[{"name":"Department of Decision Sciences, The George Washington University, Washington, DC 20052, USA"}]}],"member":"1968","published-online":{"date-parts":[[2022,5,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1111\/1467-9884.00298","article-title":"A Model-based method for disclosure limitation of business microdata","volume":"51","author":"Franconi","year":"2002","journal-title":"Statistician"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1111\/j.1751-5823.2009.00079.x","article-title":"Disclosure control of business microdata: A density-based approach","volume":"77","author":"Ichim","year":"2009","journal-title":"Int. Stat. Rev."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Duncan, G.T., Elliot, M., and Salazar-Gonzales, J. (2011). Statistical Confidentiality: Principles and Practice, Springer.","DOI":"10.1007\/978-1-4419-7802-8"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/09332480.2020.1847945","article-title":"Special Issue: A New Generation of Statisticians Tackles Data Privacy","volume":"33","author":"Liu","year":"2020","journal-title":"Chance"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1080\/07350015.1989.10509729","article-title":"The risk of disclosure for microdata","volume":"7","author":"Duncan","year":"1989","journal-title":"J. Bus. Econ. Stat."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1610","DOI":"10.1287\/mnsc.1060.0562","article-title":"A data disclosure policy for count data based on the COM-Poisson distribution","volume":"52","author":"Kadane","year":"2006","journal-title":"Manag. Sci."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1016\/B0-12-369398-5\/00053-0","article-title":"Confidentiality and Disclosure Limitation","volume":"1","author":"Fienberg","year":"2005","journal-title":"Encycl. Soc. Meas."},{"key":"ref_8","first-page":"35","article-title":"A data-swapping technique using ranks\u2014A method for disclosure control (with comments)","volume":"6","author":"Carlson","year":"2002","journal-title":"Res. Off. Stat."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0378-3758(82)90058-1","article-title":"Data swapping: A technique for disclosure control","volume":"6","author":"Dalenius","year":"1982","journal-title":"J. Stat. Plan. Inference"},{"key":"ref_10","first-page":"219","article-title":"Enhancing access to microdata while protecting confidentiality","volume":"6","author":"Duncan","year":"1991","journal-title":"Stat. Sci."},{"key":"ref_11","unstructured":"Moore, R.A. (1996). Controlled Data-Swapping Techniques for Masking Public Use Micro-Data Sets."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1549","DOI":"10.1287\/mnsc.41.9.1549","article-title":"Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach","volume":"41","author":"Muralidhar","year":"1995","journal-title":"Manag. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1399","DOI":"10.1287\/mnsc.45.10.1399","article-title":"A general additive data perturbation method for database security","volume":"45","author":"Muralidhar","year":"1999","journal-title":"Manag. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1287\/mnsc.1050.0503","article-title":"Data Shuffling\u2014A new Masking Approach for Numerical Data","volume":"52","author":"Muralidhar","year":"2006","journal-title":"Manag. Sci."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1111\/j.1467-985X.2004.00343.x","article-title":"Releasing multiple imputed, synthetic, public-use microdata: An illustration and empirical study","volume":"168","author":"Reiter","year":"2005","journal-title":"J. R. Stat. Soc. A"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1002\/wics.3","article-title":"Data masking for disclosure limitation","volume":"1","author":"Duncan","year":"2009","journal-title":"WIRES Comput. Stat."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1111\/1740-9713.01608","article-title":"The art of data privacy","volume":"19","year":"2022","journal-title":"Significance"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/09332480.2020.1847957","article-title":"Risk-weighted data synthesizers for microdata dissemination","volume":"33","author":"Hu","year":"2020","journal-title":"Chance"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1198\/000313006X124640","article-title":"A framework for evaluating the utility of data altered to protect confidentiality","volume":"60","author":"Karr","year":"2006","journal-title":"Am. Stat."},{"key":"ref_20","first-page":"331","article-title":"A paradigm for masking (camouflaging) information","volume":"73","author":"Nakhleh","year":"2005","journal-title":"Int. Stat. Rev."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1109\/TIFS.2013.2253320","article-title":"Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach","volume":"8","author":"Sankar","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_22","first-page":"7","article-title":"A decision-theoretic approach to data disclosure problems","volume":"4","author":"Trottini","year":"2001","journal-title":"Res. Off. Stat."},{"key":"ref_23","unstructured":"Trottini, M. (2003). Decision Models for Data Disclosure Limitation. [Ph.D. Dissertation, Department of Statistics, Carnegie Mellon University]."},{"key":"ref_24","unstructured":"Keeney, R.L., and Raiffa, H. (1976). Decisions with Multiple Objectives-Preferences and Value Tradeoffs, Wiley."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1111\/j.1751-5823.2011.00140.x","article-title":"Risk-utility for statistical disclosure limitation: How to think, but not how to act?","volume":"79","author":"Cox","year":"2011","journal-title":"Int. Stat. Rev."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Preneel, B., Sassone, V., and Wegener, I. (2006). Differential privacy. 33rd International Colloquium on Automata, Languages and Programming, Part II (ICALP 2006), Springer.","DOI":"10.1007\/11787006"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1080\/09332480.2020.1847947","article-title":"How statisticians should grapple with privacy in a changing data landscape","volume":"33","author":"Snoke","year":"2020","journal-title":"Chance"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1023\/A:1025606604377","article-title":"Maximum entropy simulation for microdata protection","volume":"13","author":"Polettini","year":"2003","journal-title":"Stat. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1016\/j.jmva.2007.08.004","article-title":"Multivariate maximum entropy identification, transformation, and dependence","volume":"99","author":"Ebrahimi","year":"2008","journal-title":"J. Multivar. Anal."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1080\/09332480.2020.1847959","article-title":"Formal privacy for modern nonparametric statistics","volume":"33","author":"Awan","year":"2020","journal-title":"Chance"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.ejor.2020.07.052","article-title":"Maximum entropy distributions with quantile information","volume":"290","author":"Bajgiran","year":"2021","journal-title":"Eur. J. Oper. Res."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1109\/PROC.1982.12425","article-title":"On the rationale of maximum-entropy methods","volume":"70","author":"Jaynes","year":"1982","journal-title":"Proc. IEEE"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Cover, T.M., and Thomas, J.A. (2006). Elements of Information Theory, Wiley. [2nd ed.].","DOI":"10.1002\/047174882X"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1109\/18.825848","article-title":"Entropy expressions for multivariate continuous distributions","volume":"46","author":"Darbellay","year":"2000","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BF02603001","article-title":"A maximum entropy characterization of symmetric Kotz type and Burr multivariate distributions","volume":"13","author":"Aulogiaris","year":"2004","journal-title":"Test"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1006\/jmva.1999.1824","article-title":"On maximum entropy characterization of Pearson\u2019s Type II and VII multivariate distributions","volume":"71","author":"Zografos","year":"1999","journal-title":"J. Multivar. Anal."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1859","DOI":"10.1016\/j.jmva.2010.03.011","article-title":"A Class of models for uncorrelated random variables","volume":"101","author":"Ebrahimi","year":"2010","journal-title":"J. Multivar. Anal."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1287\/mnsc.48.12.1613.439","article-title":"Perturbing Nonnormal Confidential Attributes: The Copula Approach","volume":"48","author":"Sarathy","year":"2002","journal-title":"Manag. Sci."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1002\/wics.1375","article-title":"Energy distance","volume":"8","author":"Rizzo","year":"2016","journal-title":"WIREs Comput. Stat."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/S0047-259X(03)00079-4","article-title":"On a new multivariate two-sample test","volume":"88","author":"Baringhaus","year":"2004","journal-title":"J. Multivar. Anal."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1214\/aoms\/1177729694","article-title":"On information and sufficiency","volume":"22","author":"Kullback","year":"1951","journal-title":"Ann. Math. Stat."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1080\/01621459.1989.10478793","article-title":"Local model influence","volume":"84","author":"McCulloch","year":"1989","journal-title":"J. Am. Stat. Assoc."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.jmva.2014.06.014","article-title":"Comparison, utility, and partition of dependence under absolutely continuous and singular distributions","volume":"131","author":"Ebrahimi","year":"2014","journal-title":"J. Multivar. Anal."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF00773669","article-title":"On the estimation of entropy","volume":"45","author":"Hall","year":"1993","journal-title":"Ann. Inst. Math. Stat."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1002\/asmb.849","article-title":"Assessment of mortgage default risk via Bayesian reliability models","volume":"26","author":"Soyer","year":"2010","journal-title":"Appl. Stoch. Model. Bus. Ind."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Kotz, S., Balakrishnan, N., and Johnson, N.L. (2000). Continuous Multivariate Distributions: Volume I: Models and Applications, Wiley. [2nd ed.].","DOI":"10.1002\/0471722065"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TSSC.1968.300117","article-title":"Prior Probabilities","volume":"4","author":"Jaynes","year":"1968","journal-title":"IEEE Trans. Sys. Sci. Cyber."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1080\/07474930801960311","article-title":"Bayes estimate and inference for entropy and information index of fit","volume":"27","author":"Mazzuchi","year":"2008","journal-title":"Econ. Rev."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/5\/670\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:08:43Z","timestamp":1760137723000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/5\/670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,10]]},"references-count":48,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["e24050670"],"URL":"https:\/\/doi.org\/10.3390\/e24050670","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2022,5,10]]}}}