Back to Search Start Over

K-Anonymity for Crowdsourcing Database.

Authors :
Wu, Sai
Wang, Xiaoli
Wang, Sheng
Zhang, Zhenjie
Tung, Anthony K. H.
Source :
IEEE Transactions on Knowledge & Data Engineering; Sep2014, Vol. 26 Issue 9, p2207-2221, 15p
Publication Year :
2014

Abstract

In crowdsourcing database, human operators are embedded into the database engine and collaborate with other conventional database operators to process the queries. Each human operator publishes small HITs (Human Intelligent Task) to the crowdsourcing platform, which consists of a set of database records and corresponding questions for human workers. The human workers complete the HITs and return the results to the crowdsourcing database for further processing. In practice, published records in HITs may contain sensitive attributes, probably causing privacy leakage so that malicious workers could link them with other public databases to reveal individual private information. Conventional privacy protection techniques, such as K-Anonymity, can be applied to partially solve the problem. However, after generalizing the data, the result of standard K-Anonymity algorithms may render uncontrollable information loss and affects the accuracy of crowdsourcing. In this paper, we first study the tradeoff between the privacy and accuracy for the human operator within data anonymization process. A probability model is proposed to estimate the lower bound and upper bound of the accuracy for general K-Anonymity approaches. We show that searching the optimal anonymity approach is NP-Hard and only heuristic approach is available. The second contribution of the paper is a general feedback-based K-Anonymity scheme. In our scheme, synthetic samples are published to the human workers, the results of which are used to guide the selection on anonymity strategies. We apply the scheme on Mondrian algorithm by adaptively cutting the dimensions based on our feedback results on the synthetic samples. We evaluate the performance of the feedback-based approach on U.S. census dataset, and show that given a predefined \(K\) , our proposal outperforms standard K-Anonymity approaches on retaining the effectiveness of crowdsourcing. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
10414347
Volume :
26
Issue :
9
Database :
Complementary Index
Journal :
IEEE Transactions on Knowledge & Data Engineering
Publication Type :
Academic Journal
Accession number :
97563113
Full Text :
https://doi.org/10.1109/TKDE.2013.93