Skip to main content
Microdata Protection Through Approximate Microaggregation
32nd Australasian Computer Science Conference (ACSC 2009) (2009)
  • Xiaoxun Sun, ACER
  • H Wang
  • J Li

Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained special interest after the disclosure of 658000 queries by the America Online (AOL) search engine in August 2006. Many algorithms, methods and properties have been proposed to deal with microdata disclosure. One of the emerging concepts in microdata protection is k- anonymity, introduced by Samarati and Sweeney. k- anonymity provides a simple and efficient approach to protect private individual information and is gaining increasing popularity. k-anonymity requires that every record in the microdata table released be indistinguishably related to no fewer than k respondents. In this paper, we apply the concept of entropy to propose a distance metric to evaluate the amount of mutual information among records in microdata, and propose a method of constructing dependency tree to find the key attributes, which we then use to process approximate microaggregation. Further, we adopt this new microaggregation technique to study k-anonymity problem, and an efficient algorithm is developed. Experimental results show that the proposed microaggregation technique is efficient and effective in the terms of running time and information loss.

Publication Date
Citation Information
Xiaoxun Sun, H Wang and J Li. "Microdata Protection Through Approximate Microaggregation" 32nd Australasian Computer Science Conference (ACSC 2009) (2009)
Available at: