skip to main content
article

Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection

Published: 01 July 2010 Publication History

Abstract

The massive amount of sensitive survey data about individuals that agencies collect and share through the Internet is causing a great deal of privacy concerns. These concerns may discourage individuals from revealing their sensitive information. Existing data collection techniques have serious downsides in terms of both efficiency and the levels of protection they offer against various realizations of threats. Moreover, they do not provide any flexibility to the users to be able to specify acceptable levels of privacy protection before deciding whether to participate in the surveys. In this paper, we propose a two-pronged privacy protection model corresponding to these two privacy concerns: these are a new efficient anonymity preserving data collection technique and a method to incorporate heterogeneous privacy constraints. Together, they help preserve the privacy of respondents both during and after data collection.

References

[1]
Berman, B. M., Singh, B. K., Lao, L., Singh, B. B., Ferentz, K. S. and Hartnoll, S. M., "Physicians' attitudes toward complementary or alternative medicine: A regional survey," J. Amer. Board Family Practice, v8, pp. 361-367, 1995.
[2]
Brickell, J. and Shmatikov, V., "Efficient anonymity-preserving data collection," Proc. 12th ACM SIGKDD Internat. Conf. Knowledge Discovery Data Mining, 2006.
[3]
Cauley, L., "NSA has massive database of Americans' phone calls," USA Today, 2006.
[4]
ElGamal, T., "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, v31, pp. 469-472, 1985.
[5]
Evfimievski, A., Srikant, R., Agrawal, R. and Gehrke, J., "Privacy preserving mining of association rules," Proc. Eighth ACM SIGKDD Internat. Conf. Knowledge Discovery Data Mining, ACM, New York, pp. 217-228, 2002.
[6]
Forman, M. A., "Testimony before U.S. House of Representatives (March 25), Committee on Government Reform, Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, Washington, DC," 2003.
[7]
Goldreich, O., Micali, S. and Wigderson, A., "How to play ANY mental game," Proc. 19th Annual ACM Conf. Theory Comput., ACM, New York, pp. 218-229, 1987.
[8]
"A chronology of data breaches," 2005.
[9]
Searls, D., "Why are privacy and advertising strange bedfellows?," Linux Journal, 2007.
[10]
Sweeney, L., "k-Anonymity: A model for protecting privacy," Internat. J. Uncertainty, Fuzziness Knowledge-Based Systems, v10, pp. 557-570, 2002.
[11]
Vijayan, J., "Forget hackers; companies responsible for most data breaches, study says," Computerworld, 2007.
[12]
"Public-key cryptography," 2008.
[13]
Yang, Z., Zhong, S. and Wright, R., "Anonymity-preserving data collection," Proc. 11th ACM SIGKDD Internat. Conf. Knowledge Discovery Data Mining, 2005.

Cited By

View all
  1. Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image INFORMS Journal on Computing
    INFORMS Journal on Computing  Volume 22, Issue 3
    Summer 2010
    159 pages

    Publisher

    INFORMS

    Linthicum, MD, United States

    Publication History

    Published: 01 July 2010
    Accepted: 01 September 2009
    Received: 01 March 2008

    Author Tags

    1. anonymity
    2. data collection
    3. information security
    4. privacy

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media