The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Injector: Mining Background Knowledge for Data Anonymization

CERIAS TR 2008-29
Tiancheng Li; Ninghui Li
Download: PDF

Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main challenge lies in modeling the adversary’s background knowledge. We propose a novel approach to deal with such attacks. In this approach, one first mines knowledge from the data to be released and then uses the mining results as the background knowledge when anonymizing the data. The rationale of our approach is that if certain facts or background knowledge exist, they should manifest themselves in the data and we should be able to find them using data mining techniques. One intriguing aspect of our approach is that one can argue that it improves both privacy and utility at the same time, as it both protects against background knowledge attacks and better preserves the features in the data. We then present the Injector framework for data anonymization. Injector mines negative association rules from the data to be released and uses them in the anonymization process. We also develop an efficient anonymization algorithm to compute the injected tables that incorporates background knowledge. Experimental results show that Injector reduces privacy risks against background knowledge attacks while improving data utility.

Added 2009-03-04



How Much is Enough? A Risk-Management Approach to Computer Security

Stanford University-Center for International Security and Cooperation
Added 2009-02-26




Briefing Booklet

Information Security Oversight Office
Added 2009-02-26

Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection

Thomas H. Ptacek, Timothy N. Newsham
Added 2009-02-26

Information Technology Research: Investing in Our Future

Bill Joy, Ken Kennedy
Added 2009-02-26

Electronic Crime Needs Assessment for State and Local Law Enforcement

Hollis Stambaugh, David S. Beaupre, et al.
Added 2009-02-26

Telecommunications and Information Security Workshop

The University of Tulsa
Added 2009-02-26


University of San Francisco Law Review (2 copies)

David E. Sorkin
Added 2009-02-26

Emory Law Journal: Computer Crime

Kurt Alexander, Scott Charney
Added 2009-02-26