Download presentation
Presentation is loading. Please wait.
1
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 1 Privacy Policy, Law and Technology Data Privacy October 30, 2008
2
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 2 k-anonymity “A release provides k-anonymity protection if the information for each person contained in the release cannot be distinguished from at least k-1 individuals whose information also appears in the release.” k = number of individuals to which a pattern of data (quasi-identifiers) may be attributed http://privacy.cs.cmu.edu/people/sweeney/kanonymity.html
3
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 3 l-diversity Large values of k may be insufficient to protect privacy when records with the same quasi-identifiers do not have a diverse set of values for their sensitive elements –Example: A table of medical records may use truncated zip-code and age range as quasi- identifiers, and may be k-anonymized such that there are at least k records for every combination of quasi-identifiers For some sets of quasi-identifiers, all patients have the same diagnosis or a small number of diagnoses The l-diversity principle adds the requirement that there be at least l values for sensitive elements that share the same quasi-identifiers –Example: Every for every zip/age combo, there must be at least 5 different diagnoses Machanavajjhala, A., Kifer, D., Gehrke, J., and Venkitasubramaniam, M. 2007. L- diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1, 1 (Mar. 2007), 3. DOI= http://doi.acm.org/10.1145/1217299.1217302http://doi.acm.org/10.1145/1217299.1217302
4
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 4 De-identification and re- identification Simplistic de-identification: remove obvious identifiers Better de-identification: also k-anonymize and/or use statistical confidentiality techniques Re-identification can occur through linking entries within the same database or to entries in external databases
5
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 5 Examples When RFID tags are sewn into every garment, how might we use this to identify and track people? What if the tags are partially killed so only the product information is broadcast, not a unique ID? How can a cellular provider identify an anonymous pre-paid cell phone user? Other examples?
6
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 6 Techniques for protecting privacy Best –No collection of contact information –No collection of long term person characteristics –k-anonymity with large value of k or l-diversity with large value of l Good –No unique identifiers across databases –No common attributes across databases –Random identifiers –Contact information stored separately from profile or transaction information –Collection of long term personal characteristics on a low level of granularity –Technically enforced deletion of profile details at regular intervals
7
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 7 Homework 5 discussion http://cups.cs.cmu.edu/courses/privpolawt ech-fa08/hw/hw5.html http://cups.cs.cmu.edu/courses/privpolawt ech-fa08/hw/hw5.html
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.