Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Privacy and anonymity in information management systems : new techniques for new practical problems
Nin J., Herranz J., Springer Publishing Company, Incorporated, New York, NY, 2010. 198 pp. Type: Book (978-1-849962-37-7)
Date Reviewed: May 3 2011

This collection of nine inviting chapters discusses current materials concerned with privacy-preserving data management, statistical disclosure control (how to generate statistics without identifying individuals), and application privacy in actions such as data mining and social networks. Advanced students, data managers, privacy experts, and computer scientists will generally find something useful in these materials.

Two chapters introduce the broad topic of privacy in information and data management systems. These provide a broad introduction to the remaining materials, as well as the techniques of randomization and dataset anonymization in time-varying data contexts. From this beginning, a chapter discusses statistical disclosure packages such as sdcMicro and the open-source sdcTable. Chapter 4 discusses disclosure risk on data drawn from the 2001 UK census.

The risk of disclosure is further analyzed in the context of auxiliary information that may contain rare but identifying traits. Several disclosure risk estimators such as those of the SPREE-type and a modified Skinner estimator are examined. Another chapter examines tabular data protection with a focus on the “cell suppression problem” and “controlled tabular adjustment.”

Of particular interest is a chapter devoted to privacy protection in data mining. The suggested technique for privacy is to utilize an extension of the SPAM algorithm for mining patterns. Suggestions for future work are discussed as well. Pseudonymized data sharing with individual researchers is possible using an algorithm that allows interaction between datasets if a cryptographic key is available. An appropriate concluding chapter addresses the yet unfolding privacy issues and solutions in social networks.

There is little discussion of the broader social and political issues of privacy in this technical treatment, although each chapter contains an abundance of references. Realizing that one treatise cannot do everything, a chapter devoted to the future of these issues would have been helpful. However, this collection does provide a useful introduction to this important topic.

Reviewer:  Brad Reid Review #: CR139024 (1112-1256)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Information Storage (H.3.2 )
 
 
Privacy (K.4.1 ... )
 
 
Information Search And Retrieval (H.3.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Information Storage": Date
Principles of delay-sensitive multimedia data storage retrieval
Gemmell J., Christodoulakis S. (ed) ACM Transactions on Information Systems 10(1): 51-90, 1992. Type: Article
May 1 1993
Partial match retrieval in implicit data structures
Alt H., Mehlhorn K., Munro J. Information Processing Letters 19(2): 61-65, 1984. Type: Article
May 1 1985
Performance of two-disk partition data allocations
Chang C., Chen C. BIT 27(3): 306-314, 1987. Type: Article
Mar 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy