TMk-anonymity: Perturbation-based data anonymization method for improving effectiveness of secondary use

Taichi Nakamura, Hiroaki Nishi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The recent emergence of smartphones, cloud computing, and the Internet of Things has brought about the explosion of data creation. By collating and merging these enormous data with other information, services that use information become more sophisticated and advanced. However, at the same time, the consideration of privacy violations caused by such merging is indispensable. Various anonymization methods have been proposed to preserve privacy. The conventional perturbation-based anonymization method of location data adds comparatively larger noise, and the larger noise makes it difficult to utilize the data effectively for secondary use. In this research, to solve these problems, we first clarified the definition of privacy preservation and then propose TMfc-anonymity according to the definition.

Original languageEnglish
Title of host publicationProceedings
Subtitle of host publicationIECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages3138-3143
Number of pages6
ISBN (Electronic)9781509066841
DOIs
Publication statusPublished - 2018 Dec 26
Event44th Annual Conference of the IEEE Industrial Electronics Society, IECON 2018 - Washington, United States
Duration: 2018 Oct 202018 Oct 23

Publication series

NameProceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society

Conference

Conference44th Annual Conference of the IEEE Industrial Electronics Society, IECON 2018
CountryUnited States
CityWashington
Period18/10/2018/10/23

Fingerprint

Anonymity
Merging
Perturbation
Smartphones
Information use
Information services
Cloud computing
Explosions
Privacy
Privacy Preservation
Internet of Things
Information Services
Cloud Computing
Explosion
Internet of things

Keywords

  • Anonymization
  • Pertur k-anonymity
  • Pk-anonymity
  • Privacy preservation
  • TMk-anon

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering
  • Industrial and Manufacturing Engineering
  • Control and Optimization

Cite this

Nakamura, T., & Nishi, H. (2018). TMk-anonymity: Perturbation-based data anonymization method for improving effectiveness of secondary use. In Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society (pp. 3138-3143). [8592838] (Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IECON.2018.8592838

TMk-anonymity : Perturbation-based data anonymization method for improving effectiveness of secondary use. / Nakamura, Taichi; Nishi, Hiroaki.

Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society. Institute of Electrical and Electronics Engineers Inc., 2018. p. 3138-3143 8592838 (Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nakamura, T & Nishi, H 2018, TMk-anonymity: Perturbation-based data anonymization method for improving effectiveness of secondary use. in Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society., 8592838, Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, Institute of Electrical and Electronics Engineers Inc., pp. 3138-3143, 44th Annual Conference of the IEEE Industrial Electronics Society, IECON 2018, Washington, United States, 18/10/20. https://doi.org/10.1109/IECON.2018.8592838
Nakamura T, Nishi H. TMk-anonymity: Perturbation-based data anonymization method for improving effectiveness of secondary use. In Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society. Institute of Electrical and Electronics Engineers Inc. 2018. p. 3138-3143. 8592838. (Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society). https://doi.org/10.1109/IECON.2018.8592838
Nakamura, Taichi ; Nishi, Hiroaki. / TMk-anonymity : Perturbation-based data anonymization method for improving effectiveness of secondary use. Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society. Institute of Electrical and Electronics Engineers Inc., 2018. pp. 3138-3143 (Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society).
@inproceedings{74c491e8a8f149ecb8508945dd8867f7,
title = "TMk-anonymity: Perturbation-based data anonymization method for improving effectiveness of secondary use",
abstract = "The recent emergence of smartphones, cloud computing, and the Internet of Things has brought about the explosion of data creation. By collating and merging these enormous data with other information, services that use information become more sophisticated and advanced. However, at the same time, the consideration of privacy violations caused by such merging is indispensable. Various anonymization methods have been proposed to preserve privacy. The conventional perturbation-based anonymization method of location data adds comparatively larger noise, and the larger noise makes it difficult to utilize the data effectively for secondary use. In this research, to solve these problems, we first clarified the definition of privacy preservation and then propose TMfc-anonymity according to the definition.",
keywords = "Anonymization, Pertur k-anonymity, Pk-anonymity, Privacy preservation, TMk-anon",
author = "Taichi Nakamura and Hiroaki Nishi",
year = "2018",
month = "12",
day = "26",
doi = "10.1109/IECON.2018.8592838",
language = "English",
series = "Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "3138--3143",
booktitle = "Proceedings",

}

TY - GEN

T1 - TMk-anonymity

T2 - Perturbation-based data anonymization method for improving effectiveness of secondary use

AU - Nakamura, Taichi

AU - Nishi, Hiroaki

PY - 2018/12/26

Y1 - 2018/12/26

N2 - The recent emergence of smartphones, cloud computing, and the Internet of Things has brought about the explosion of data creation. By collating and merging these enormous data with other information, services that use information become more sophisticated and advanced. However, at the same time, the consideration of privacy violations caused by such merging is indispensable. Various anonymization methods have been proposed to preserve privacy. The conventional perturbation-based anonymization method of location data adds comparatively larger noise, and the larger noise makes it difficult to utilize the data effectively for secondary use. In this research, to solve these problems, we first clarified the definition of privacy preservation and then propose TMfc-anonymity according to the definition.

AB - The recent emergence of smartphones, cloud computing, and the Internet of Things has brought about the explosion of data creation. By collating and merging these enormous data with other information, services that use information become more sophisticated and advanced. However, at the same time, the consideration of privacy violations caused by such merging is indispensable. Various anonymization methods have been proposed to preserve privacy. The conventional perturbation-based anonymization method of location data adds comparatively larger noise, and the larger noise makes it difficult to utilize the data effectively for secondary use. In this research, to solve these problems, we first clarified the definition of privacy preservation and then propose TMfc-anonymity according to the definition.

KW - Anonymization

KW - Pertur k-anonymity

KW - Pk-anonymity

KW - Privacy preservation

KW - TMk-anon

UR - http://www.scopus.com/inward/record.url?scp=85061527969&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85061527969&partnerID=8YFLogxK

U2 - 10.1109/IECON.2018.8592838

DO - 10.1109/IECON.2018.8592838

M3 - Conference contribution

AN - SCOPUS:85061527969

T3 - Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society

SP - 3138

EP - 3143

BT - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -