Visible to the public TMk-Anonymity: Perturbation-Based Data Anonymization Method for Improving Effectiveness of Secondary Use

TitleTMk-Anonymity: Perturbation-Based Data Anonymization Method for Improving Effectiveness of Secondary Use
Publication TypeConference Paper
Year of Publication2018
AuthorsNakamura, T., Nishi, H.
Conference NameIECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society
Keywordsanonymity, anonymization, composability, gaussian distribution, Global Positioning System, Human Behavior, human factors, k-anonymity, Metrics, perturbation, Perturbation methods, Pk-anonymity, privacy, privacy preservation, pubcrawl, resilience, Resiliency, TMk-anonymity
Abstract

The recent emergence of smartphones, cloud computing, and the Internet of Things has brought about the explosion of data creation. By collating and merging these enormous data with other information, services that use information become more sophisticated and advanced. However, at the same time, the consideration of privacy violations caused by such merging is indispensable. Various anonymization methods have been proposed to preserve privacy. The conventional perturbation-based anonymization method of location data adds comparatively larger noise, and the larger noise makes it difficult to utilize the data effectively for secondary use. In this research, to solve these problems, we first clarified the definition of privacy preservation and then propose TMk-anonymity according to the definition.

URLhttps://ieeexplore.ieee.org/document/8592838
DOI10.1109/IECON.2018.8592838
Citation KeynakamuraTMkAnonymityPerturbationBasedData2018