Distributed privacy preserving data collection

Mingqiang Xue, Panagiotis D. Papadimitriou, Chedy Raïssi, Panos Kalnis, Hungkeng Pung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.
Original languageEnglish (US)
Title of host publicationDatabase Systems for Advanced Applications
PublisherSpringer Nature
Pages93-107
Number of pages15
ISBN (Print)9783642201486
DOIs
StatePublished - 2011

Bibliographical note

KAUST Repository Item: Exported on 2020-10-01

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Distributed privacy preserving data collection'. Together they form a unique fingerprint.

Cite this