Link¨
- ping 2016
On machine learning for data privacy Vicen¸ c Torra
- Dec. 7, 2016
School of Informatics, University of Sk¨
- vde, Sweden
On machine learning for data privacy Vicen c Torra Dec. 7, 2016 - - PowerPoint PPT Presentation
Link oping 2016 On machine learning for data privacy Vicen c Torra Dec. 7, 2016 School of Informatics, University of Sk ovde, Sweden Outline Outline Outline Disclosure risk. A quantitative measures: record linkage The worst-case
Outline Outline
Vicen¸ c Torra; Data privacy Link¨
1 / 69
Outline
Link¨
2 / 69
Introduction > Settings Outline
Link¨
3 / 69
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Link¨
4 / 69
Introduction > Masking methods Outline
X X’
Vicen¸ c Torra; Data privacy Link¨
5 / 69
Anonymization > Masking methods Outline
X X’
Vicen¸ c Torra; Data privacy Link¨
6 / 69
Introduction > Masking methods Outline
Identifiers non-confidential quasi-identifier attributes confidential Protected microdata (X′) Protected Original id Xc id Xnc Xc X′
nc
(data masking) anonymization Identifiers Original non-confidential quasi-identifier attributes Original confidential Original microdata (X) attributes attributes
Vicen¸ c Torra; Data privacy Link¨
7 / 69
Introduction > Masking methods Outline
Original microdata (X) Masking method Protected microdata (X’) Result(X’) Disclosure Measure Information Loss Measure Data analysis Result(X) Data analysis Risk
Vicen¸ c Torra; Data privacy Link¨
8 / 69
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Link¨
9 / 69
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Link¨
9 / 69
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Link¨
9 / 69
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Link¨
9 / 69
Introduction > Masking methods Outline
X X’
Vicen¸ c Torra; Data privacy Link¨
10 / 69
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Link¨
11 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
12 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
13 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
14 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
14 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
14 / 69
Introduction > Disclosure risk Outline
c = Xc.
nc = ρ(Xnc).
Identifiers non-confidential quasi-identifier attributes confidential Protected microdata (X′) Protected Original id Xc id Xnc Xc X′
nc
(data masking) anonymization Identifiers Original non-confidential quasi-identifier attributes Original confidential Original microdata (X) attributes attributes
Vicen¸ c Torra; Data privacy Link¨
15 / 69
Introduction > Disclosure risk Outline
X
X’ / A B
Vicen¸ c Torra; Data privacy Link¨
16 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
17 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
18 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
18 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
18 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
18 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
19 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
19 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
19 / 69
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Link¨
19 / 69
Disclosure risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
20 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
21 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
21 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
21 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
22 / 69
Disclosure risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
23 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
24 / 69
Disclosure Risk > Distances Outline
n
Vicen¸ c Torra; Data privacy Link¨
25 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
26 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
26 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
27 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
27 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
28 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
29 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
30 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
30 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
31 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
31 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
32 / 69
Disclosure Risk > Distances Outline
N
Vicen¸ c Torra; Data privacy Link¨
33 / 69
Disclosure Risk > Distances Outline
N
n
Vicen¸ c Torra; Data privacy Link¨
34 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
35 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
35 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
36 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
36 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
37 / 69
Disclosure Risk > Distances Outline
5 10 5 10
Two classes with different correlations
table[,1] table[,2]
(-15.0,-15.0) 15.0 15.0 qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qq qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qq qq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qq q qq q qq qq qq qq qq qq qqq qqq qqq qqq qqqqqqq qqqqqqqqqqqqqqqqqq qqqqqqq qqq qqq qqq qqq qq qq qq qq qq qq q qq q qq q qqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqq q qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qq q qqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qq qq qq qq qqq qqq qqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqqq qqq qqq qq qq qq qq (-15.0,-15.0) 15.0 15.0 q q qq q q q q q q q q q q qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qq q q q q q q q q q q qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qqqqqqqqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqqqqqqqqq q q q q qq q q q q q q q q q qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qq q q q q q q q q q qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqq (-15.0,-15.0) 15.0 15.0 qqqqqqqqqqqqqqqqqqqqqqq qqqqqqqqqq qq qq q qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qq q qq qq qqqqqqqqqq qqqqqqqqqqqqqqqqqqqqqq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qqqqqqqqqqqqqqqqqqq qqqqqqqqqqqqqqqqqqqqqqqqqq qqqqqqqqqqqqqqqqqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqqqqqq qqq qq qq q q qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qq q q qq qq qqq qqqqqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qqqqqqqqqqqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqqqqqqqqqqq (-15.0,-15.0) 15.0 15.0 qqq qqqq qq qqqqqq qq qq qq qq q qq q qq q q qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qq q q qq q qq q qq qq qq qq qqqqqq qq qqqq qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qqqqqqqqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqqqqqqqqq qqqqqqqqqqqqqqqq qq qqqq qq qq qq qq q qq q q q qq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qq q q q qq q qq qq qq qq qqqq qq qqqqqqqqqqqqqqq q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q qqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqq
Vicen¸ c Torra; Data privacy Link¨
38 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
39 / 69
Disclosure Risk > Distances Outline
dm: distance; dNC: positive; dPD: positive-definite matrix
Vicen¸ c Torra; Data privacy Link¨
40 / 69
Disclosure Risk > Distances Outline
M4-33 M4-28 M4-82 M5-38 M6-385 M6-853 d2W M 29.83 41.37 24.33 718.43 11.81 17.77 d2W Mm 3.43 6.26 2.26 190.75 4.34 6.72 d2CI 280.24 427.75 242.86 42, 731.22 24.17 87.43 d2CIm 155.07 441.99 294.98 4, 017.16 79.43 829.81 d2SBNC 32.04 2, 793.81 150.66 10, 592.99 13.65 14.11 d2SB 13.67 3, 479.06 139.59 169, 049.55 13.93 13.70 1h=3600; 1d = 86400s
N: number of records; n: number of attributes d2W Mm d2CIm Additional n
i=1 pi = 1
µ(∅) = 0 Constraints pi > 0 µ(V ) = 1 µ(A) ≤ µ(B) when A ⊆ B µ(A) + µ(B) ≥ µ(A ∪ B) + µ(A ∩ B) Total Constr. N(N − 1) + N + 1 + n N(N − 1) + N + 2 + (n
k=2
n
k
n
2
c Torra; Data privacy Link¨
41 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
42 / 69
Transparency Outline
Vicen¸ c Torra; Data privacy Link¨
43 / 69
Transparency > Definition Outline
Vicen¸ c Torra; Data privacy Link¨
44 / 69
Transparency Outline
Vicen¸ c Torra; Data privacy Link¨
45 / 69
Transparency Outline
Vicen¸ c Torra; Data privacy Link¨
46 / 69
Transparency Outline
Vicen¸ c Torra; Data privacy Link¨
47 / 69
Transparency > Attacks Outline
Vicen¸ c Torra; Data privacy Link¨
48 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
49 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
50 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
51 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
51 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
51 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
51 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
51 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
52 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
52 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
52 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
52 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
53 / 69
Transparency > Rank swapping and transparency Outline
ℓ ∈ Bj(a)
Vicen¸ c Torra; Data privacy Link¨
53 / 69
Transparency > Rank swapping and transparency Outline
ℓ ∈ Bj(a)
Vicen¸ c Torra; Data privacy Link¨
53 / 69
Transparency > Rank swapping and transparency Outline
ℓ ∈ Bj(a)
ℓ ∈ ∩1≤j≤cBj(xi).
Vicen¸ c Torra; Data privacy Link¨
53 / 69
Transparency > Rank swapping and transparency Outline
ℓ ∈ Bj(a)
ℓ ∈ ∩1≤j≤cBj(xi).
Vicen¸ c Torra; Data privacy Link¨
53 / 69
Transparency > Rank swapping and transparency Outline
ℓ ∈ ∩1≤j≤cBj(xi).
Vicen¸ c Torra; Data privacy Link¨
54 / 69
Transparency > Rank swapping and transparency Outline
1
2
3
4
Vicen¸ c Torra; Data privacy Link¨
55 / 69
Transparency > Rank swapping and transparency Outline
1
2
3
4
Vicen¸ c Torra; Data privacy Link¨
56 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
57 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
58 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
59 / 69
Transparency > Rank swapping and transparency Outline
Vicen¸ c Torra; Data privacy Link¨
60 / 69
Transparency > Avoiding Attacks RS Outline
Vicen¸ c Torra; Data privacy Link¨
61 / 69
Transparency > Avoiding Attacks RS Outline
Vicen¸ c Torra; Data privacy Link¨
62 / 69
Transparency > Avoiding Attacks RS Outline
Vicen¸ c Torra; Data privacy Link¨
62 / 69
Transparency > Avoiding Attacks RS Outline
Vicen¸ c Torra; Data privacy Link¨
63 / 69
Information Loss Outline
Vicen¸ c Torra; Data privacy Link¨
64 / 69
Information Loss Outline
Vicen¸ c Torra; Data privacy Link¨
65 / 69
Summary Outline
Vicen¸ c Torra; Data privacy Link¨
66 / 69
Disclosure Risk > Distances Outline
Vicen¸ c Torra; Data privacy Link¨
67 / 69
Summary Outline
Vicen¸ c Torra; Data privacy Link¨
68 / 69
References Outline
Record Linkage, Information Fusion 26 (2015) 144-153.
disclosure risk assessment, Information Fusion 13:4 (2012) 274-284.
Knowledge Engineering, 67 (2008) 399-412.
Knowledge Engineering, 64:1 (2008) 346-364.
sequence, submitted.
Vicen¸ c Torra; Data privacy Link¨
69 / 69