User K-Anonymity for Privacy Preserving Data Mining of Query Logs

Provided by: Reed Business Information
Topic: Security
Format: PDF
The anonymization of query logs is an important process that needs to be performed prior to the publication of such sensitive data. This ensures the anonymity of the users in the logs, a problem that has been already found in released logs from well known companies. This paper presents the anonymization of query logs using micro-aggregation. The authors' proposal ensures the k-anonymity of the users in the query log, while preserving its utility. They provide the evaluation of their proposal in real query logs, showing the privacy and utility achieved, as well as providing estimations for the use of such data in data mining processes based on clustering.

Find By Topic