Utility-Preserving Differentially Private Data Releases Via Individual Ranking Microaggregation

Utility-Preserving Differentially Private Data Releases Via Individual Ranking Microaggregation

David Sánchez Josep Domingo-Ferrer Sergio Martínez and Jordi Soria-Comas UNESCO Chair in Data Privacy, Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Av. Països Catalans 26, E-43007 Tarragona, Catalonia
E-mail {david.sanchez,josep.domingo,sergio.martinezl,jordi.soria}@urv.cat

Being able to release and exploit open data gathered in information systems is crucial for researchers, enterprises and the overall society. Yet, these data must be anonymized before release to protect the privacy of the subjects to whom the records relate. Differential privacy is a privacy model for anonymization that offers more robust privacy guarantees than previous models, such as -anonymity and its extensions. However, it is often disregarded that the utility of differentially private outputs is quite limited, either because of the amount of noise that needs to be added to obtain them or because utility is only preserved for a restricted type and/or a limited number of queries. On the contrary, -anonymity-like data releases make no assumptions on the uses of the protected data and, thus, do not restrict the number and type of doable analyses. Recently, some authors have proposed mechanisms to offer general-purpose differentially private data releases. This paper extends such works with a specific focus on the preservation of the utility of the protected data. Our proposal builds on microaggregation-based anonymization, which is more flexible and utility-preserving than alternative anonymization methods used in the literature, in order to reduce the amount of noise needed to satisfy differential privacy. In this way, we improve the utility of differentially private data releases. Moreover, the noise reduction we achieve does not depend on the size of the data set, but just on the number of attributes to be protected, which is a more desirable behavior for large data sets. The utility benefits brought by our proposal are empirically evaluated and compared with related works for several data sets and metrics.

Privacy-preserving data publishing, Differential privacy, -Anonymity, Microaggregation, Data utility

1 Introduction

Releasing and exploiting open data is crucial to boost progress of knowledge, economy and society. Indeed, the availability of such data facilitates research and allows better marketing, better planning and better social services. However, data publication often faces privacy threats due to the confidentiality of the information that is released for secondary use. To tackle this problem, a plethora of methods aimed at data anonymization have been proposed within the field of statistical disclosure control Hundepool (). Such methods distort input data in different ways (e.g. noise addition, removal, sampling, data generalization, etc.) so that the probability of re-identifying individuals and, thus, disclosing their confidential information is brought below a tolerable threshold. Even though those methods have been shown to improve privacy protection while preserving a reasonable level of analytical utility (the main motivation of data publishing), they offer no formal privacy guarantees.

In contrast, privacy models proposed in recent years within the computer science community Drechsler (); Danezis () seek to attain a predefined notion of privacy, thus offering a priori privacy guarantees. These guarantees are interesting because they ensure a minimum level of privacy regardless of the type of transformation performed on input data. Among such models, -anonymity and the more recent -differential privacy have received a lot of attention.

-Anonymity SamaratiSweeney98 (); Samarati01 () seeks to make each record in the input data set indistinguishable from, at least, other records, so that the probability of re-identification of individuals is, at most, . Different anonymization methods have been proposed to achieve that goal, such as removal of outlying records, generalization of values to a common abstraction Samarati01 (); Sweeney02 (); Aggarwal05 (); Goldberger10 () or multivariate microaggregation Domi02 (); Domi05 (). The latter method partitions a data set into groups at least similar records and replaces the records in each group by a prototypical record (e.g. the centroid record, that is, the average record). Whatever the computational procedure, -anonymity focuses on masking quasi-identifier attributes; these are attributes (e.g., Age, Gender, Zipcode and Race) that are assumed to enable re-identifying the respondent of a record because they are linkable to analogous attributes available in external identified data sources (like electoral rolls, phone books, etc.). -Anonymity does not mask confidential attributes (e.g., salary, health condition, political preferences, etc.) unless they are also quasi-identifiers. While -anonymity has been shown to provide reasonably useful anonymized results, especially for small , it is also vulnerable to attacks based on the possible lack of diversity of the non-anonymized confidential attributes or on additional background knowledge available to the attacker Mach06 (); Wong06 (); Li07 (); Domipsai08 ().

Unlike -anonymity, the more recent -differential privacy Dwork06 () model does not make any assumptions on which attributes are quasi-identifiers, that is, on the background knowledge available to potential attackers seeking to re-identify the respondent of a record. -Differential privacy guarantees that the anonymized output is insensitive (up to a factor dependent on ) to the modification, deletion or addition of any single input record in the original data set. In this way, the privacy of any individual is not compromised by the publication of the anonymized output, which is a much more robust guarantee than the one offered by -anonymity. Differential privacy is attained by adding an amount of noise to the original outputs that is proportional to the sensitivity of such outputs to modifications of particular individual records in the original data set. This sensitivity does not depend on the specific values of attributes in specific records, but on the domains of those attributes. Basing the sensitivity and hence the added noise on attribute domains rather than attribute values satisfies the privacy guarantee but may yield severely distorted anonymized outputs, whose utility is very limited. Because of this, -differential privacy was originally proposed for the interactive scenario, in which the outputs are the answers to interactive queries rather than the data set itself. When applying -differential privacy to this scenario, the anonymizer returns noise-added answers to interactive queries. In this way, the accuracy/utility of the response to a query depends on the sensitivity of the query, which is usually less than the sensitivity of the data set attributes. However, the interactive setting of -differential privacy limits the number and type of queries that can be performed. The proposed extensions of -differential privacy to the non-interactive setting (generation of entire anonymized data sets) overcome the limitation on the number of queries, but not on the type of queries for which some utility is guaranteed (see Section 2.2 below).

1.1 Contribution and plan of this paper

In previous works TrustCom (); VLDB (), we showed that the noise required to fulfill differential privacy in the non-interactive setting can be reduced by using a special type of microaggregation-based -anonymity on the input data set. The rationale is that the microaggregation performed to achieve -anonymity helps reducing the sensitivity of the input versus modifications of individual records. As a result, data utility preservation can be improved (in terms of less data distortion) without renouncing the strong privacy guarantee of differential privacy. With such a mechanism, the sensitivity reduction depends on the number of -anonymized groups to be released; in turn, this number is a function of the value of and the cardinality of the data set. The larger the group size , the less sensitive are the group centroids resulting from the microaggregation; on the other hand, the smaller the data set, the smaller the number of different group centroids in the microaggregated data set. Thus, as the group size increases or the data set size decreases, the sensitivity decreases and less noise needs to be added to reach differential privacy. Hence, the resulting differentially private data have higher utility. In the two abovementioned works, we empirically showed that the noise reduction more than compensates the information loss introduced by microaggregation.

In line with TrustCom (); VLDB (), in this paper we investigate other transformations of the original data aimed at reducing their sensitivity. The proposal in this paper is based on individual ranking microaggregation, a kind of microaggregation that is more flexible and utility-preserving than the one used in TrustCom (); VLDB (). In contrast to the previous works, the reduction of sensitivity achieved by the method presented in this paper does not depend on the size of the data set, but just on the number of attributes to be protected. This is more desirable for large data sets or in scenarios in which only the confidential attributes should be protected. In fact, experiments carried on two reference data sets show a significant improvement of data utility (in terms of relative error and preservation of attribute distributions) with respect to the previous work. Moreover, the microaggregation mechanism used in this paper is simpler and more scalable, which facilitates implementation and practical deployment.

The rest of this paper is organized as follows. Section 2 reviews background on microaggregation, -differential privacy and -differentially private data publishing. Section 3 proposes the new method to generate -differentially private data sets that uses a special type of microaggregation to reduce the amount of required noise. Implementation details are given for data sets with numerical and categorical attributes. Section 4 reports an empirical comparison of the proposed method and previous proposals, based on two reference data sets. The final section gathers some conclusions.

2 Background and related work

2.1 Background on microaggregation

Microaggregation Domi02 (); Defays93 () is a family of anonymization algorithms that works in two stages:

  • First, the data set is clustered in such a way that: i) each cluster contains at least elements; ii) elements within a cluster are as similar as possible.

  • Second, each element within each cluster is replaced by a representative of the cluster, typically the centroid value/tuple.

Depending on whether they deal with one or several attributes at a time, microaggregation methods can be classified into univariate and multivariate:

  • Univariate methods deal with multi-attribute data sets by microaggregating one attribute at a time. Input records are sorted by the first attribute, then groups of successive values of the first attribute are created and all values within that group are replaced by the group representative (e.g. centroid). The same procedure is repeated for the rest of attributes. Notice that all attribute values of each record are moved together when sorting records by a particular attribute; hence, the relation between the attribute values within each record is preserved. This approach is known as individual ranking Defays93 (); Defays98 () and, since it microaggregates one attribute at a time, its output is not -anonymous at the record level. Individual ranking just reduces the variability of attributes, thereby providing some anonymization. In Domi01 () it was shown that individual ranking causes low information loss and, thus, its output better preserves analytical utility. However, the disclosure risk in the anonymized output remains unacceptably high Domi02a ().

  • To deal with several attributes at a time, the trivial option is to map multi-attribute data sets to univariate data by projecting the former onto a single axis (e.g. using the sum of z-scores or the first principal component, see Defays98 ()) and then use univariate microaggregation on the univariate data. Another option avoiding the information loss due to single-axis projection is to use multivariate microaggregation able to deal with unprojected multi-attribute data Domi02 (); Sande01 (). If we define optimal microaggregation as finding a partition in groups of size at least such that within-groups homogeneity is maximum, it turns out that, while optimal univariate microaggregation can be solved in polynomial time Hansen03 (), unfortunately optimal multivariate microaggregation is NP-hard Oganian01 (). This justifies the use of heuristic methods for multivariate microaggregation, such as the MDAV algorithm Domi05 (), which has been extensively used to enforce -anonymity at the record level Domi05 (); Domingo10 (); Martinez12a (). In any case, multivariate microaggregation leads to higher information loss than individual ranking Domi01 ().

2.2 Background on differential privacy

Differential privacy was originally proposed by Dwork06 () as a privacy model in the interactive setting, that is, to protect the outcomes of queries to a database. The assumption is that an anonymization mechanism sits between the user submitting queries and the database answering them.

Definition 1 (-Differential privacy)

A randomized function gives -differential privacy if, for all data sets , such that one can be obtained from the other by modifying a single record, and all , it holds


The computational mechanism to attain -differential privacy is often called -differentially private sanitizer. A usual sanitization approach is noise addition: first, the real value of the response to a certain user query is computed, and then a random noise, say , is added to mask , that is, a randomized response is returned. To generate , a common choice is to use a Laplace distribution with zero mean and scale parameter, where:

  • is the differential privacy parameter;

  • is the -sensitivity of , that is, the maximum variation of the query function between neighbor data sets, i.e., sets differing in at most one record.

Specifically, the density function of the Laplace noise is

Notice that, for fixed , the higher the sensitivity of the query function , the more Laplace noise is added: indeed, satisfying the -differential privacy definition (Definition 1) requires more noise when the query function can vary strongly between neighbor data sets. Also, for fixed , the smaller , the more Laplace noise is added: when is very small, Definition 1 almost requires that the probabilities on both sides of Equation (1) be equal, which requires the randomized function to yield very similar results for all pairs of neighbor data sets; adding a lot of noise is a way to achieve this.

Differential privacy was also proposed for the non-interactive setting in Blum (); Dwor09 (); Hardt2010 (); Chen11 (). Even though a non-interactive data release can be used to answer an arbitrarily large number of queries, in all these proposals, this is obtained at the cost of offering utility guarantees only for a restricted class of queries Blum (), typically count queries.

2.3 Related work on differentially private data publishing

In contrast to the general-purpose data publication offered by -anonymity, which makes no assumptions on the uses of published data and does not limit the type and number of analyses that can be performed, -differential privacy severely limits data uses. Indeed, in the interactive scenario, -differential privacy allows only a limited and pre-selected number of queries of a certain type to be answered; in the extensions to the non-interactive scenario, any number of queries can be answered, but utility guarantees are only offered for a restricted class of queries. We next review the literature on non-interactive -differential privacy, which is the focus of this paper.

The usual approach to releasing differentially private data sets is based on histogram queries Xiao2010b (); Xu2012 (), that is, on approximating the data distribution by partitioning the data domain and counting the number of records in each partition set. To prevent the counts from leaking too much information they are computed in a differentially private manner. Apart from the counts, partitioning can also reveal information. One way to prevent partitioning from leaking information consists in using a predefined partition that is independent of the actual data under consideration (e.g. by using a grid Mach08 ()).

The accuracy of the approximation obtained via histogram queries depends on the size of the histogram bins (the greater they are, the more imprecise is the attribute value) as well as on the number of records contained in them (the more records, the less relative error). For data sets with sparsely populated regions, using a predefined partition may be problematic. Several strategies have been proposed to improve the accuracy of differentially private count (histogram) queries, which we next review. In Hay2010 () consistency constraints between a set of queries are exploited to increase accuracy. In Xiao2010 () a wavelet transform is performed on the data and noise is added in the frequency domain. In Xu2012 (); Li13 () the histogram bins are adjusted to the actual data. In Cormode2012 (), the authors consider differential privacy of attributes whose domain is ordered and has moderate to large cardinality (e.g. numerical attributes); the attribute domain is represented as a tree, which is decomposed in order to increase the accuracy of answers to count queries (multi-dimensional range queries). In Mohammed11 (), the authors generalize similar records by using coarser categories for the classification attributes; this results in higher counts of records in the histogram bins, which are much larger than the noise that needs to be added to reach differential privacy. For data sets with a significant number of attributes, attaining differential privacy while at the same time preserving the accuracy of the attribute values (by keeping the histogram bins small enough) becomes a complex task. Observe that, given a number of bins per attribute, the total number of bins grows exponentially with the number of attributes. Thus, in order to avoid obtaining too many sparsely populated bins, the number of bins per attribute must be significantly reduced (with the subsequent accuracy loss). An interesting approach to deal with multidimensional data is proposed in Mir (); Zhang (). The goal of these papers is to compute differentially private histograms independently for each attribute (or jointly for a small number of attributes) and then try to generate a joint histogram for all attributes from the partial histograms. This was done for a data set of commuting patterns in Mir () and for an arbitrary data set in Zhang (). In particular, Zhang () first tried to build a dependency hierarchy between attributes. Intuitively, when two attributes are independent, their joint histogram can be reconstructed from the histograms of each of the attributes; thus, the dependency hierarchy helps determining which marginal or low-dimension histograms are more interesting to approximate the joint histogram. The approaches in Mir (); Zhang () can be seen as complementary to our proposal, which can be used as an alternative for computing the histograms. This does not mean that our proposal is not competitive against Mir (); Zhang () in terms of data utility. The data utility depends highly on the actual data that we have. The most favorable cases for Zhang () are data sets with low dependency between attributes (for instance, when attributes are completely independent, computing the marginal histograms is enough) or at least with attributes that depend on a small number of other attributes (for example, for an attribute that depends only on another attribute, the joint histogram for these two attributes is enough). On the contrary, if an attribute has a sizeable and similar level of dependency on all the other attributes, there is no advantage in using Zhang ().

Our work differs from all previous ones in that it is not limited to histogram queries and it allows dealing with any type of attributes (ordered or unordered).

2.4 Related work on microaggregation-based differentially-private data publishing

In  VLDB () we presented an approach that combines -anonymity and -differential privacy in order to reap the best of both models: namely, the reasonably low information loss incurred by -anonymity and its lack of assumptions on data uses, as well as the robust privacy guarantees offered by -differential privacy. In that work, we first defined the notion of insensitive microaggregation, which is a multivariate microaggregation procedure that partitions data in groups of records with a criterion that is relatively insensitive to changes in the data set. To do so, insensitive microaggregation defines a total order for the joint domains of all the attributes of the input data set . Insensitive microaggregation ensures that, for every pair of data sets and differing in a single record, the resulting clusters will differ at most in a single record. Hence, the centroids used to replace records of each cluster will have low sensitivity to changes of one input record. Specifically, when centroids are computed as the arithmetic average of the elements of the cluster, the sensitivity is as low as , where is the distance between the most distant records of the joint domains of the input data and is the size of the clusters. This sensitivity is much lower and restrained than the one offered by standard microaggregation algorithms, such as MDAV Domi05 (), whose output is highly dependent on the input data (i.e. modification of a single record may lead to completely different clusters). Note also that the sensitivity of individual input records (i.e. without microaggregation) is . The downside of insensitive microaggregation is that it yields worse within-cluster homogeneity than standard microaggregation and, hence, higher information loss.

As a result of insensitive microaggregation with cluster cardinality , input data are -anonymized in such a way that all attributes are considered as being quasi-identifiers. To obtain a differentially private output, an amount of noise needs to be added to cluster centroids that depends on their sensitivity. Centroids provided by insensitive microaggregation have a low sensitivity and thus require little noise, which in turn means incurring low information loss. In data publishing, centroids are released, each one computed on a cluster of cardinality and having sensitivity (see discussion above). Hence, the sensitivity of the whole data set to be released is . Thus, for numerical data sets, Laplace noise with scale parameter must be added to each centroid to obtain a -differentially private output.

For the above procedure to effectively reduce the noise added to the output with respect to standard differential privacy via noise addition with no prior microaggregation, the sensitivity needs to be smaller than the sensitivity of the data set without prior microaggregation, that is, . To that end, the -anonymity parameter should be adjusted. Increasing has two effects: it reduces the contribution of each record to the cluster centroid (thereby reducing the centroid sensitivity), and it reduces the number of clusters (thereby reducing the number of published centroids). Specifically, for to be less than , a value is needed. This shows that the utility benefits of this method depend on the size of the data set.

Here one must acknowledge that, while prior microaggregation enables noise reduction as discussed above, microaggregating records into centroids also entails some utility loss. However, this loss is more than compensated by the benefits brought by cluster centroids being less sensitive than individual records. This is so because microaggregation can exploit the underlying structure of data and reduce the sensitivity with relatively little utility loss. This hypothesis is empirically supported by the extensive evaluations performed in VLDB (); TrustCom ().

Even though this previous work effectively reduces the amount of Laplace noise to be added to reach -differential privacy, the fact that it requires using a microaggregation parameter that depends on the number of records of the input data set may be problematic for large data sets. In other words, for large data sets, a value of so large may be required that the utility loss incurred in the prior microaggregation step cancels the utility gain due to subsequent noise reduction.

To circumvent this problem, in this paper we present an alternative procedure that offers utility gains with respect to standard differential privacy regardless of the number of records of the input data set. Specifically, our method rests on individual ranking univariate (rather than insensitive multivariate) microaggregation to reduce sensitivity in a way that only depends on the number of attributes to be protected. 111Microaggregation is used to improve the utility of the released data, while privacy guarantees are provided by differential privacy alone. However, it is interesting to note that, while the multivariate microaggregation in TrustCom (); VLDB () yielded an intermediate -anonymous data set, the individual ranking microaggregation in this paper yields an intermediate probabilistically -anonymous prob_k_anon () data set. This behavior is more desirable in at least the following cases: i) data sets with a large number of records; ii) data sets with a small number of attributes; iii) data sets in which only the confidential attributes, which usually represent a small fraction of the total attributes, should be protected.

3 Differential privacy via individual ranking microaggregation

In this section we present a method to obtain differentially private data releases which, for specific data sets, may reduce noise even more than the above-mentioned approach based on multivariate microaggregation. First, we discuss in detail the limitations of that previous mechanism. Then, we present a new proposal that, based on individual ranking, reduces the sensitivity of the microaggregated output independently of the number of records. For simplicity, we first assume data sets with numerical attributes to which an amount of Laplace noise is added to satisfy differential privacy. At the end of this section, we detail how the proposed method can be adapted to deal also with categorical attributes.

3.1 Limitations of multivariate microaggregation for differentially private data releases

In TrustCom (); VLDB (), the utility gain was limited by the insensitive multivariate microaggregation. Such microaggregation anonymizes the input data set at the record level.

The sensitivity of the set of centroids thus obtained is because, in the worst case:

  • Changing a single record in the input data set can cause all clusters to change by one record

  • The record changed within each cluster can alter the value of the cluster centroid by up to , where is the maximum distance between elements in the domain of the input data (we are assuming that centroids are computed as the arithmetic average of record values in the cluster).

The above worst-case scenario overestimates the actual sensitivity of the output and, thus, the noise to be added to the centroids to achieve -differential privacy. Indeed, it is highly unlikely that modifying one input record by up to would change by one record in each cluster. Let us consider an extreme scenario, in which all records in the input data set take the maximum possible value tuple in the domain of . Recall that the insensitive microaggregation used sorts and groups records according to a total order defined over the domain of . Then, assume that the record located in the last position of the sorted list changes to take the minimum value tuple of the domain of , so that its distance to any of the other records in the data set is . According to the ordering criterion, such a change would cause the modified record to be “inserted” in the first position of the sorted list. Consequently, all other records would be moved to the next position, which would change all clusters by one record. However, from the perspective of the centroid computation (i.e the average of the record in the group), only the first cluster centroid, where the modified record is located, would change and its variation would be exactly .

In other intermediate scenarios, the effect of modifying one record would be split among the centroids of the clusters affected by the modification. Intuitively, the aggregation of the centroid variations would seem to be upper-bounded by , which corresponds to the extreme case detailed above. However, this is only true if a total order for the domain of exists for which the triangular inequality is satisfied, that is, when holds for any records , and in . Unfortunately, this is generally not the case for multivariate data because a natural total order does not always exist. Artificial total orders defined for multivariate data (for example, see the proposal in VLDB ()) do not fulfill the triangular inequality and, as discussed above, the sensitivity of individual centroids should be multiplied by the number of released centroids () to satisfy differential privacy.

The lack of a total order does not occur in univariate numerical data sets, that is, those with just one attribute. With a single numerical attribute, a natural total order (the usual numerical order) can be easily defined with respect to the minimum or maximum value of the domain of values of the attribute so that the triangular inequality is fulfilled. In these conditions, it is shown in Domi02 () that clusters in the optimal microaggregation partition contain consecutive values. The next lemma shows that the sensitivity of the set of centroids is indeed .

Lemma 1

Let be a totally ordered set of values that has been microaggregated into clusters of consecutive values each, except perhaps one cluster that contains up to consecutive values. Let the centroids of these clusters be , respectively. Now if, for any single , is replaced by such that and new clusters and centroids are computed, it holds that

Proof. Assume without loss of generality that (the proof for is symmetric). Assume, for the sake of simplicity, that is a multiple of (we will later relax this assumption). Hence, exactly clusters are obtained, with cluster containing consecutive values from to . Let be the cluster to which belongs. We can distinguish two cases, namely and .

Case 1. When , stays in . Thus, the centroids of all clusters other than stay unchanged and the centroid of cluster increases by , because . So the lemma follows in this case.

Case 2. When , two or more clusters change as a result of replacing by : cluster loses and another cluster (for ) acquires . To maintain its cardinality , after losing , cluster acquires . In turn, cluster loses and acquires , and so on, until cluster , which transfers its smallest value to cluster and acquires . From cluster upwards, nothing changes. Hence the overall impact on centroids is


Hence, the lemma follows also in this case.

Now consider the general situation in which is not a multiple of . In this situation there are clusters and one of them contains between and values. If we are in Case 1 above and this larger cluster is cluster , the centroid of changes by less than , so the lemma also holds; of course if the larger cluster is one of the other clusters, it is unaffected and the lemma also holds. If we are in Case 2 above and the larger cluster is one the clusters that change, one of the fractions in the third term of Expression (2) above has denominator greater than and hence the overall sum is less than , so the lemma also holds; if the larger cluster is one of the unaffected ones, the lemma also holds.

3.2 Sensitivity reduction in multivariate data sets via individual ranking microaggregation

From the previous section, it turns out that, for univariate data sets, the amount of noise needed to fulfill differential privacy after the microaggregation step is significantly lower than with the method in VLDB () (i.e. vs. ). Moreover, this noise is exactly -th of the noise required by the standard differential privacy approach, in which the sensitivity is because any output record may change by following a modification of any record in the input (as also stated in Kellaris13 () when sorting attributes by their value counts).

To benefit from such a noise reduction in the case of multivariate data sets, we rely on the following composition property of differential privacy.

Lemma 2 (Sequential composition McSherryPINQ ())

Let each sanitizing algorithm in a set of sanitizers provide -differential privacy. Then a sequence of sanitizers applied to a data set provides -differential privacy.

In the context of differentially private data publishing, we can think of a data release as the collected answers to successive queries for each record in the data set. Let be the query that returns the value of record (from a total of records) in the data set . In turn, we can think of as the collected answers to successive queries for each of the attributes of record . Let be the query function that returns the value of attribute (from a total of attributes). We have . The differentially private data set that we seek can be generated by giving a differentially private answer to the set of queries for all and all . Differential privacy being designed to protect the privacy of individuals, such queries are very sensitive and require a large amount of noise.

To reduce sensitivity and hence the amount of noise needed to attain differential privacy, we rely on individual ranking microaggregation (which is more utility-preserving than multivariate microaggregation, as explained in Section 2.1 above). Instead of asking for , the data set is generated by asking for individual ranking microaggregation centroids. Let be the group of records of data set in the individual ranking microaggregation of attribute that corresponds to , and let be associated centroid. We replace by .

Now, we have to minimize the amount of noise required to answer these queries in a differentially private manner. We work with each attribute independently and then combine the queries corresponding to different attributes by applying sequential composition. If we get an -differentially private response to for each , then joining them we have -differential privacy.

For attribute , we have to answer the query in an -differentially private manner. If we compute the -sensitivity of this query, , we can attain -differential privacy by adding a Laplace distributed noise with scale parameter to each component . We have already seen that for individual ranking microaggregation the -sensitivity of the list of centroids is . However, in our query each centroid appears (or more times); hence, the sensitivity is multiplied by and becomes (or greater), which is not satisfactory. Our goal is to show that we can attain -differential privacy by adding a Laplace noise with scale rather than (as an -sensitivity of would require). To that end, instead of taking an independent draw of the noise distribution for each of the components, we use the same draw for all the components that refer to the same centroid. That is, we use the same random variable to determine the amount of noise that is added to all the components sharing the same value ; similarly, in data set we use as noise for all components sharing the same value . For -differential privacy, it must be

If any of is not a centroid value plus the noise corresponding to that centroid value (note that equal centroid values are added equal noise values, as said above), the probabilities in both the numerator and the denominator of the above expression are zero, and differential privacy is satisfied. Otherwise, we have that are only repetitions of different values, that is, the values of the centroids plus the noise corresponding to each centroid value. Thus, we can simplify the expression by removing all but one of each of those repetitions. Let and for be the centroid values for attribute associated to and , respectively, and and be Laplace noises with scale associated to those centroid values, respectively. After rewriting the above inequality in these terms and taking into account that the sensitivity of the list of centroids is , it is evident that -differential privacy is satisfied.

Hence, we propose the following algorithm to obtain a differentially private version of a numerical original data set with attributes .

Algorithm 1

  1. Use individual-ranking microaggregation independently on each attribute , for to . Within each cluster, all attribute values are replaced by the cluster centroid value, so each microaggregated cluster consists of repeated centroid values. Let the resulting microaggregated data set be .

  2. Add Laplace noise independently to each attribute of , where the scale parameter for attribute is

    The same noise perturbation is used on all repeated centroid values within each cluster.

Now we can state:

Lemma 3

The data set output by Algorithm 1 is -differentially private.

Proof. The lemma follows from the discussion preceding Algorithm 1.

Note. In Step 2 of Algorithm 1, it is critically important to add exactly the same noise perturbation to all repeated values within a microaggregated cluster. If we used different random perturbations for each repeated value, the resulting noise-added cluster would be equivalent to the answers to independent queries. This would multiply by the sensitivity of the centroid, which would cancel the sensitivity reduction brought by microaggregation in Step 1.

3.3 Choosing the microggregation parameter

In order to obtain an -differentially private data set, by parallel composition it suffices to make each record -differentially private. In turn, to make a record -differentially private, we have two possibilities:

  1. Plain Laplace noise addition without microaggregation. Given that each record has attributes, by sequential composition we need -differentially private attribute values to obtain an -differentially private record. Hence, Laplace noise addition with scale parameter needs to be added to each attribute .

  2. Our approach. When performing individual-ranking microaggregation and replacing original values by cluster centroids, we preserve the structure of records. By sequential composition, to make a record of -differentially private, we need to make attributes in -differentially private. Hence, Laplace noise addition with scale parameter needs to be added to each attribute . However, dealing with rather than is better, because is less sensitive. Indeed, , so the scale parameter is .

According to the above discussion, our approach adds less noise than plain Laplace noise addition for any . Admittedly, its prior individual ranking microaggregation causes some additional information loss. However, this information loss grows very slowly with the cluster size and also with the number of attributes (see Domi01 ()), whereas the Laplace noise being added decreases very quickly with . The experiments in Section 4 below show that the information loss caused by individual ranking is negligible in front of Laplace noise addition.

3.4 Dealing with categorical attributes

So far, we have assumed that attributes in the input data set are numerical, so that: i) they are totally ordered; ii) centroids can be computed as standard numerical averages; and iii) Laplace noise with an appropriate scale parameter can be added to satisfy differential privacy. However, many data sets contain attributes with categorical values, such as Ethnicity, Country of birth or Job. Unlike numerical attributes, categorical attributes take values from a finite set of categories for which the arithmetical operations needed to microaggregate and add noise to the outputs do not make sense. Following the discussions in VLDB (), some alternative mechanisms can be used to adapt the above-described method to categorical attributes:

  • Unlike numbers, the domain of values of a categorical attribute should be defined by extension. Ways to do this are a flat list or a hierarchy/taxonomy. The latter is more desirable, since the taxonomy implicitly captures the semantics inherent to categorical values (e.g., disease categories, job categories, sports categories, etc.). In this manner, further operations can exploit this taxonomic knowledge and provide a semantically coherent management of attribute values, which is usually the most important dimension of utility for categorical data Martinez12a ().

  • A suitable function is needed to compare categorical values that exploits the semantics provided by the corresponding taxonomies (if any). Semantic distance measures quantify the amount of differences observed between two categorical values according to the knowledge modeled in a taxonomy. In VLDB () several measures available in the literature were discussed from the perspective of differential privacy, and the measure proposed in Sanc12 () was evaluated as the most suitable one. It computes the distance between two categorical values and of attribute , whose domain is modeled in the taxonomy , as a logarithmic function of their number of non-common taxonomic ancestors divided (for normalization) by their total number of ancestors:


    where is the set of taxonomic ancestors of in , including itself.

    The advantages of this measure are: i) it captures subtle differences between values modeled in the taxonomy because all taxonomic ancestors are considered; ii) thanks to its non-linearity, its sensitivity to outlying values is low, which is desirable to reduce the sensitivity of data; iii) it fulfills the following measure properties: non-negativity, reflexivity, symmetry and triangle inequality, thereby defining a coherent total order within the attribute categories.

  • A total order that yields insensitive and within-cluster homogeneous microaggregation can be defined through the notion of marginality infsci2013 (). Marginality measures how far each categorical value of the attribute in the data set lies from the “center” of that attribute’s taxonomy, according to a semantic distance (like the above-described one). A total order between categorical values can be defined based on their marginality: categorical values present in the data set are sorted according to their distance to the most marginal value (i.e. the categorical value farthest from the center of the domain). The marginality of each value in with respect to its domain of values is computed as


    where is the semantic distance between two values. The greater , the more marginal (i.e., the less central) is with regard to .

  • Microaggregation replaces original values in a cluster by the cluster centroid, which is the arithmetical mean in case of numerical data. Centroids for categorical data can be obtained by relying again on marginality: the mean of a sample of categorical values can be approximated by the least marginal value in the taxonomy, that is, the value that minimizes the aggregated distances to all other elements in the data set Martinez12 (). Formally, given a sample of a nominal attribute in a certain cluster, the marginality-based centroid for that cluster is defined as


    where is the minimum taxonomy extracted from that includes all values in .

  • Finally, to satisfy differential privacy, an amount of uncertainty proportional to each attribute’s sensitivity should be added prior to releasing the data. Since adding Laplace noise to categorical centroids makes no sense, an alternative way to obtain differentially private outputs consists in selecting attribute centroids in a probabilistic manner. This can be done by means of the Exponential Mechanism proposed in McSherry (). This mechanism chooses the centroid closest to the optimum (i.e. least marginal value, in our case) according to the input data, the -differential privacy parameter and a quality criterion, which in this case is the marginality of each categorical value. Formally, given a function with discrete outputs , the mechanism chooses an output that is close to the optimum according to the input data and quality criterion , while preserving -differential privacy. Each output is associated with a selection probability , which grows exponentially with the quality criterion, as follows:

    Algorithm 2 describes the application of this mechanism to select -differentially private centroids.

Algorithm 2

let be a cluster with at least values of the attribute

  1. Take as the quality criterion for each centroid candidate in the additive inverse of its marginality towards the attribute values contained in , that is, ;

  2. Sample the centroid from a distribution that assigns


4 Empirical evaluation

This section details the empirical evaluation of the proposed method (in terms of noise reduction and utility preservation) in comparison with the method in VLDB ().

4.1 Evaluation data

As evaluation data we used two data sets:

  • “Census” Brand (), which is a standard data set meant for testing privacy protection methods. It was used in the European project CASC and in Dand02b (); Yanc02 (); Lasz05 (); Domi05 (); Domingo10 () and it contains 1,080 records with 13 numerical attributes. Since all attributes represent non-negative numerical magnitudes (i.e. money amounts), we defined the domains of the attributes as . The domain upper bound is a reasonable estimate if the attribute values in the data set are representative of the attribute values in the population, which in particular means that the population outliers are represented in the data set. The difference between the bounds of the domain of each attribute determines the sensitivity of that attribute () and, as detailed above, determines the amount of Laplace noise to be added to microaggregated outputs. Since the Laplace distribution takes values in the range , for consistency we bound noise-added outputs to the domain ranges define above.

  • “Adult” Adult (), which is a well-known data set from the UCI repository. It contains both numeric and categorical attributes and it was also used in VLDB (). To enable a fair comparison, we used the same attributes as in VLDB (). As categorical attributes, we used OCCUPATION (that covers 14 distinct categories) and NATIVE-COUNTRY (with 41 categories). The taxonomies modeling attribute domains were extracted from WordNet 2.1 Fellbaum98 (), a general-purpose repository that taxonomically models more than 100,000 concepts. Mappings between attribute labels and WordNet concepts are those stated in Martinez12a (). Domain boundaries for each attribute and sensitivities for centroid quality criteria were set as described in Section 3.4. As numeric attributes, we used AGE and (working) HOURS-PER-WEEK. Domain boundaries and sensitivities for these two numerical attributes were computed as explained for “Census”. The experiments were carried out with the training corpus from the Adult data set, which consists of 30,162 records after removing records with missing values of the considered attributes.

4.2 Evaluation measures and experiments

Since our proposal aims at providing differentially private outputs while making as few assumptions on their uses as -anonymity-like models do, we used generic utility metrics, as usual in the literature on -anonymity and statistical disclosure control (e.g. Domi05 ()). In that literature, the utility of the anonymized output is evaluated in terms of information loss. Information loss measures the differences between the original and the anonymized data set.

A well-known generic information loss measure that is suitable to capture the distortion of the output is the Relative Error (RE), which measures the error of an answer as a function of the answer’s magnitude; in this manner, answers with large magnitudes can tolerate larger errors Xiao11 (). In our setting, for each numerical attribute value , RE is measured as the absolute difference between each original attribute value and its masked version divided by the original value.

A sanity bound is included in the denominator to mitigate the effect of excessively small values. Since in our approach we aim at publishing the attribute values of the records in the data set, we defined this sanity bound as a function of the domain of values each attribute ; specifically, . In this manner, the mitigation effect of the sanity bound is adapted to the order of magnitude of each attribute.

For categorical attributes we directly measured the error as the semantic distance (Expression ( 3)) between original and masked records, which is already normalized in the 0..1 range. The Relative Error of the whole data set is measured as the average Relative Error of all attributes of all records. Notice that with a high error, that is, a high information loss, a lot of data uses are severely damaged, like for example subdomain analyses (analyses restricted to parts of the data set).

Another generic information loss measure focuses on how different are variances of attributes in the original and anonymized data sets Baeyens99 (). Preserving the sample variance is relevant for statistical analysis and closely depends on how constrained the microggregation algorithm is. The variation of the attribute variances (for numerical attributes) has been measured as follows:

where and denote the variances of attribute in the original data set and its masked version, respectively.

Moreover, since many works on differential privacy focus on preserving the utility of counting queries  Xiao2010 (); Xiao2010b (); Xu2012 (); Blum (); Dwor09 (); Hardt2010 (); Chen11 (), we measured how the methods preserve the data distribution by building histograms of each attribute and comparing the distribution between the original and masked values according to the well-known Jensen-Shannon divergence (JSD) Lin91 (), which is symmetric and bounded in the 0..1 range. At a data set level, we averaged the divergence of all the attributes. Histograms for continuous attributes (i.e., those of the “Census” data set) have been created by grouping records in bins accounting 1/100th of the attribute domain. In the “Adult” data set, in which all the attributes (either numeric or categorical) are discrete and have a limited set of values, each bin corresponds to one individual attribute value.

The parameter for differential privacy was set to , which covers the usual range of differential privacy levels observed in the literature Dwork11 (); Char10 (); Char12 (); Mach08 (); VLDB (). As discussed in Section 3.2, the scale parameter of the Laplace noise needed by our method to achieve -differential privacy is ; that is, it depends on the level of prior microaggregation and on the number of attributes to be protected. We evaluated the influence of these parameters in the “Census” data set by taking between 2 and 100 and . For the “Adult” data set, as done in  VLDB (), we set between 2 and 200.

4.3 Comparison with baseline methods

In order to benchmark the results of our proposal, we considered the following baseline methods:

  • Plain Laplace noise addition for -differential privacy as described in Section 3.3 above. Even though this mechanism is the naivest way to produce differentially private data sets, it is useful as an upper bound of information loss. By comparing against it, we can quantify the gain brought by the prior microaggregation steps.

  • Plain individual ranking, with no subsequent Laplace noise addition. Although this method does not lead to -differential privacy by itself, we want to show the contribution of individual ranking to the information loss caused by our method.

We computed RE and JSD for the baseline methods above and our approach for the two evaluation data sets. Figure 1 shows the comparison between plain Laplace noise addition, plain individual ranking and our approach for “Census”; Figure 2 shows the same comparison for “Adult”. Due to the broad ranges of the RE values, a scale is used for the Y-axes.

The plain Laplace noise addition baselines are displayed as gray horizontal lines, because they do not depend on the value of . Each test involving Laplace noise shows the average results of 10 runs, for the sake of stability. In any case, the spikes shown in the graphs are the result of the randomization inherent to Laplace noise addition.

Figure 1: “Census” data set: RE (on the left) and JSD (on the right) for the proposed method for several numbers of attributes () and values (black non-horizontal lines, as RE and JSD depend on the microaggregation parameter ) compared to plain Laplace noise addition (gray horizontal lines, because RE and JSD do not depend on ) and plain individual ranking microaggregation.
Figure 2: “Adult” data set: RE (on the left) and JSD (on the right) for the proposed method for several values (black non-horizontal lines, as RE and JSD depend on the microaggregation parameter ) compared to plain Laplace noise addition (gray horizontal lines, because RE and JSD do not depend on ) and plain individual ranking microaggregation.

Both Figure 1 and Figure 2 show that, already for , our approach reduces the noise required to attain -differential privacy compared to plain Laplace noise addition. This confirms what was said in Section 3.3.

The relative improvement of RE depends on the value of . For the amount of noise involved is so high that even with the noise reduction achieved by our method, the output data are hardly useful. For there is a substantial decline of RE for low , whereas for larger RE stays nearly constant and is almost as low as the RE achieved by individual ranking alone. This is especially noticeable when only one attribute is protected (for the “Census” data set) for which the information loss of the proposed method even grows for ; with a single attribute, we do not need to apply sequential composition (that would require more noise to be added) in order to attain a certain level of -differential privacy; at the same time, while for large the RE of the method can be as low as the RE of individual ranking, it cannot be lower, which explains why the former RE grows for large in the top-left graph of Figure 1 (in that graph the RE of the method becomes equal to the RE of individual ranking and the latter RE grows with ). Thus, for large , the distortion added by individual ranking in larger clusters limits the effect of the noise reduction achieved at the -differential privacy stage due to the decreased sensitivity with larger . For the “Adult” data set, the difference in RE between the -differentially private outcome and the plain individual ranking is more noticeable because of the need to discretize noise-added values. However, the larger cardinality of the data set also allows using larger values (to reduce the sensitivity) than in “Census” with comparable utility damage.

The comparison of distributions between the original and the masked data also outputs a similar pattern: JSD improves for . For the “Adult” data set, Figure 2 shows that the behaviors of JSD and RE are similar. For the “Census” data set, however, Figure 1 reports a sharp decline of JSD for low , whereas for large the divergence of distributions tends to increase; this is especially noticeable for , whose results for (for a single attribute) and for (for multiple attributes) are even worse than with with plain Laplace noise. In these cases, the distortion introduced by the individual ranking microaggregation dominates the gain brought by the reduced noise addition. This is clearer when the number of attributes is small, because so is the noise to be added to fulfill -differential privacy. It is important to note that, for the “Census” data set, the continuous values of the attributes have been discretized in bins covering 1/100th of the attribute domain. Thus, a microaggregation with a low would tend to cluster values that fall within the same bin, which explains the low distortion incurred in the (discretized) distributions. For larger , however, microaggregation tends to group records of different bins, which significantly alters the data distribution; this is precisely what happens for the “Adult” data set for any value of , because bins cover individual attribute values.

4.4 Comparison with prior multivariate microaggregation

In a second battery of experiments, we compared the proposed method with the previous work VLDB (), in which records were microaggregated using an insensitive version of the MDAV multivariate algorithm Domi05 ().

Similarly to previous figures, Figures 3 and 4 depict the RE and JSD values for the different parameterizations of , and , for the “Census” and “Adult” data sets, respectively. The results of the proposed method are represented with black lines whereas the results of the previous work VLDB () are displayed by gray lines with the same pattern for each value. As baselines, we also added the RE and JSD values incurred by the individual ranking and the insensitive MDAV microaggregation algorithms alone.

Figure 3: “Census” data set: RE (on the left) and JSD (on the right) in the proposed method for several numbers of attributes () and values (black dashed lines) compared to the previous work VLDB () (gray dashed lines), the insensitive version of the MDAV microaggregation algorithm (gray solid lines) and the plain individual ranking method (black solid lines).
Figure 4: “Adult” data set: RE (on the left) and JSD (on the right) in the proposed method for several values (black dashed lines) compared to the previous work VLDB () (gray dashed lines), the insensitive version of the MDAV microaggregation algorithm (gray solid lines) and the plain individual ranking method (black solid lines).

First, we notice that insensitive MDAV multivariate microaggregation alone incurs a noticeably higher RE than plain individual ranking microaggregation for . JSD is also higher for “Census” and significantly higher for “Adult”, because in the latter case the already discrete values are not grouped into bins and, thus, any change is reflected as a divergence in distributions. In fact, for “Adult” our differentially private method is even able to improve the figures of insensitive MDAV for . For , both types of microaggregation are equivalent, so their REs and JSDs overlap. On the other hand, as discussed in Section 3.3, for multivariate data sets (), individual ranking microaggregation yields more homogeneous clusters than MDAV multivariate microaggregation, because the former method builds clusters on an attribute-by-attribute basis, whereas the latter builds clusters by taking all attributes together. Moreover, the insensitive version of MDAV required for the method in VLDB () to fulfill differential privacy produces yet less homogeneous clusters, due to the artificial total order enforced for input records.

When comparing both differentially private approaches, our current proposal offers a significant improvement in most cases (for RE and JSD), but such an improvement depends on the number of attributes to be protected. For , we observe the largest differences between both methods, because the scale parameter of our approach is just whereas it is for VLDB (). In fact, even for the smallest value (), the reduction of information loss is noticeable. However, as shown also in the previous experiments, for the largest value (), the distortion caused by individual ranking dominates the small amount noise subsequently added to satisfy differential privacy, which is especially noticeable for the JSD; for (for RE) or (for JSD) this effect overrides the improvement brought by our proposed method.

When the number of attributes to be protected increases, the effective reduction of RE and JSD achieved by our approach decreases, because the scale of the required noise increases as , whereas it stays constant for the method in VLDB (). Indeed, using prior individual-ranking microaggregation requires subsequently adding noise whose scale factor increases with in order to attain -differential privacy, whereas the noise to be added after multivariate microaggregation does not depend on (see Section 3.2 above). When grows, this subsequent noise addition may override the advantage of individual ranking with respect to multivariate microaggregation; in practice, this only happens in pretty extreme cases (with many attributes, small values and large values), because multivariate microaggregation also incurs substantial information loss for large . In Figure 3 we can see some such extreme cases (, and values) in which the method in VLDB () is able to match or slightly outperform our method; this is more noticeable for JSD than for RE because, in the former case, the discretization of the continuous attribute values into bins smooths the effects of the noise. It is however interesting to observe that, for , our method is even able to outperform the multivariate microaggregation for (with 8 attributes) and for (with 13 attributes). This shows the greater room for improvement that individual ranking offers over the multivariate microaggregation for .

In fact, by equating the noise scale parameter of VLDB () and our method, we have

Hence, both scale parameters coincide for . Thus, for , the scale parameter of VLDB () and therefore the noise added to reach -differential privacy are smaller. For the “Census” data set, this means . When the number of attributes to be protected decreases to , we get (which is beyond the values represented in the X-axes of the above figures); further, for , we get , which is outright impossible. Moreover, the practical reduction of information loss is only noticeable for small values (0.1 and 1.0). For , the high information loss caused by the insensitive MDAV algorithm alone severely limits the noise reduction gain.

Finally, to evaluate the influence of the prior microaggregation algorithm, we measured the preservation of attribute variances as described in Section 4.2. This was done for “Census”, which is the only data set with continuous numeric attributes. The results with 8 attributes are reported in Table 1. In particular, the table shows that, for medium and large (values 1 and 10), our method based on individual ranking significantly improves on the MDAV-based one in VLDB () for all .

2 25.89 25.06 22.84 25.01 9.42 24.77
25 21.74 24.57 8.08 20.19 0.16 3.06
50 20.75 23.05 2.33 9.80 0.02 0.45
100 15.27 17.38 0.38 0.95 0.02 0.89
2 9.14 8.21 7.40 8.20 3.45 8.12
25 8.33 8.05 2.30 6.62 0.12 1.23
50 7.41 7.52 1.13 3.63 0.04 0.12
100 5.69 5.84 0.11 0.50 0.05 0.18
2 24.97 24.90 11.79 22.89 0.47 10.36
25 24.83 24.80 12.85 22.72 0.44 8.63
50 24.17 24.83 9.64 22.56 0.37 8.10
100 23.63 24.78 9.60 22.27 0.1 6.84
2 10.46 9.58 8.69 9.55 3.72 9.46
25 9.43 9.35 2.39 7.64 0.08 1.13
50 8.29 8.78 1.16 3.81 0.00 0.06
100 5.78 6.65 0.48 0.42 0.03 0.23
2 16.71 15.87 14.50 15.84 6.59 15.62
25 14.35 15.54 5.33 12.87 0.16 2.22
50 13.13 14.60 2.41 6.63 0.01 0.06
100 9.86 11.48 0.18 0.94 0.05 0.27
2 22.07 21.22 19.30 21.21 8.20 21.04
25 19.50 20.73 6.36 17.12 0.19 2.37
50 15.61 19.44 3.63 8.05 0.03 0.15
100 10.20 14.81 0.45 0.85 0.04 0.44
2 8.61 7.69 6.91 7.69 3.12 7.57
25 7.63 7.54 2.97 6.14 0.03 1.12
50 6.57 7.05 0.95 3.25 0.02 0.06
100 4.95 5.44 0.30 0.41 0.01 0.20
2 70.22 69.71 64.01 69.66 24.06 68.89
25 63.42 68.21 14.90 55.85 0.05 5.93
50 49.28 64.05 3.66 25.56 0.12 0.25
100 41.36 47.38 0.78 2.05 0.21 0.81
Table 1: “Census”: variations of attribute variances between the attributes in the original and masked data sets with the proposed method (IR, individual ranking) and the one in VLDB () (MV, MDAV multivariate microaggregation) using different values of and .

We can see that the variations of the attribute variances are always greater (for all attributes and all and values) for the method in VLDB () than for the one proposed in this paper. Differences between the two methods are greater for larger values (i.e., 1 and 10) and larger values (i.e. 25 and above); in these cases, the amount of noise that needs to be added is smaller and, thus, the influence of the prior microaggregation is more noticeable. The differences between both methods illustrate how individual-ranking microaggregation does a better job at preserving the internal structure (and, thus the statistical properties) of the attributes, since these are aggregated independently. In contrast, multivariate microaggregation is more constrained because all the attributes of each record are considered at once; this suppresses more variance and hence incurs higher information loss. In any case, the variations of the attribute variances tend to decrease as grows, which suggests that the prior microaggregation helps decrease the large variance introduced by the noise added to satisfy differential privacy. However, there are some cases (i.e. attributes 2, 4, 5 and 8) in which, for large and values (i.e. 10 and 100, respectively), variations increase; this shows how, for relaxed values of , the distortion introduced by the coarser microaggregation dominates the reduction of noise.

5 Conclusions

In VLDB () a method was presented that combines -anonymity and -differential privacy to reap the best of both models: namely, on the one side the reasonably low information loss incurred by -anonymity and its lack of assumptions on data uses (which do not limit the kind of analyses that can be performed), and on the other side the robust privacy guarantees offered by -differential privacy. In this paper, we have offered an alternative method that, by relying individual ranking microaggregation, is able to effectively reduce even more the scale parameter of noise in most scenarios, which is of utmost importance for data analysis. Such noise reduction has been discussed theoretically and it has been illustrated empirically for two reference data sets, by focusing on the error introduced in the attribute values and the preservation of attribute distributions.

The method proposed here is also easier to implement than the one in VLDB (), because the individual ranking algorithm only relies on the natural order of individual attributes. Moreover, its computational cost is , whereas insensitive multivariate microaggregation takes . Since usually , the current method is more scalable as the number of records in a data set grows. Moreover, prior individual-ranking microaggregation incurs less information loss than the prior multivariate microaggregation used in VLDB (). Finally, the proposed method is especially indicated when only a subset of attributes needs to be protected (e.g. the confidential attributes).

We leave as future work the exploration of other types of noise. For instance, using a noise calibrated to the smooth sensitivity of the data would seem an interesting improvement. The main reason is that it would reduce the dependency of the amount of required noise on the size of the attribute domain.

Acknowledgments and disclaimer

This work was partly supported by the European Commission (through project H2020 “CLARUS”), by the Spanish Government (through projects “ICWT” TIN2012-32757, “CO-PRIVACY” TIN2011-27076-C03-01 and “SmartGlacis”) and by the Government of Catalonia (under grant 2014 SGR 537). Josep Domingo-Ferrer is partially supported as an ICREA-Acadèmia researcher by the Government of Catalonia. The opinions expressed in this paper are the authors’ own and do not necessarily reflect the views of UNESCO.


  • (1) A. Hundepool, J. Domingo-Ferrer, L. Franconi, S. Giessing, E. Schulte Nordholt, K. Spicer, P.-P de Wolf, Statistical Disclosure Control, Wiley, 2012.
  • (2) J. Drechsler, My understanding of the differences between the CS and the statistical approach to data confidentiality, in: 4th IAB Wokshop on confidentiality and disclosure, Institute for Employment Research, 2011.
  • (3) G. Danezis, J. Domingo-Ferrer, M. Hansen, J.-H. Hoepman, D. Le Métayer, R. Tirtea, S. Schiffner, Privacy and Data Protection by Design – from policy to engineering, European Union Agency for Network and Information Security (ENISA), 2015, http://www.enisa.europa.eu/media/news-items/deciphering-the-landscape-for-privacy-by-design
  • (4) P. Samarati, L. Sweeney, Protecting privacy when disclosing information: -anonymity and its enforcement through generalization and suppression, SRI International Report, 1998.
  • (5) P. Samarati, Protecting respondents’ identities in microdata release, IEEE Transactions on Knowledge and Data Engineering 13(6) (2001) 1010-1027.
  • (6) L. Sweeney, -Anonymity: a model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-based Systems 10(5) (2002) 557-570.
  • (7) G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigraphy, D. Thomas, A. Zhu, A, Anonymizing tables, in: Proceedings of the 10th International Conference on Database Theory, 2005, pp. 246-258.
  • (8) J. Goldberger, T. Tassa, Efficient anonymizations with enhanced utility, Transactions on Data Privacy 3 (2010) 149-175.
  • (9) J. Domingo-Ferrer, J.M. Mateo-Sanz, Practical data-oriented microaggregation for statistical disclosure control, IEEE Transactions on Knowledge and Data Engineering 14(1) (2002) 189-201.
  • (10) J. Domingo-Ferrer, V. Torra, Ordinal, continuous and heterogeneous -anonymity through microaggregation, Data Mining and Knowledge Discovery 11(2) (2005) 195-212.
  • (11) A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, l-Diversity: privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data 1(1) (2007) 3
  • (12) R. Wong, J. Li, A. Fu, K. Wang, (, k)-Anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006, pp. 754-759.
  • (13) N. Li, T. Li, S. Venkatasubramanian, t-Closeness: privacy beyond k-anonymity and l-diversity, in: Proceedings of the IEEE International Conference on Data Engineering, 2007, pp. 106-115.
  • (14) J. Domingo-Ferrer, V. Torra, A critique of -anonymity and some of its enhancements, in: ARES/PSAI, IEEE Computer Society, 2008, pp. 990-993.
  • (15) C. Dwork, Differential privacy, in: Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, LNCS 4052, Springer, 2006, pp. 1-12.
  • (16) J. Soria-Comas, J. Domingo-Ferrer, D. Sánchez, S. Martínez, Improving the utility of differentially private data releases via -anonymity, in: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013, pp. 372-379.
  • (17) J. Soria-Comas, J., Domingo-Ferrer, D. Sánchez, S. Martínez, Enhancing data utility in differential privacy via microaggregation-based -anonymity, VLDB Journal 23(5) (2014) 771-794.
  • (18) D. Defays, P. Nanopoulos, Panels of enterprises and confidentiality: the small aggregated method, in: Proceedings of the 92 Symposium on Design and Analysis of Longitudinal Surveys, 1993, pp. 195-204.
  • (19) D, Defays, M.N. Anwar, Masking microdata using micro-aggregation, Journal of Official Statistics 14(4) (1998) 449-461.
  • (20) J. Domingo-Ferrer, V. Torra, A quantitative comparison of disclosure control methods for microdata, in : Confidentiality, Disclosure and Data Access, 2001, pp. 111-133.
  • (21) J. Domingo-Ferrer, J.M. Mateo-Sanz, A. Oganian, V. Torra, A. Torres, On the security of microaggregation with individual ranking: analytical attacks, International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems 18(5) (2002) 477-492.
  • (22) G. Sande, Methods for data-directed microaggregation in one or more dimensions, in: Federal Committee on Statistical Methodology Research Conference, Arlington VA, 2001.
  • (23) S.L. Hansen, S. Mukherjee, A polynomial algorithm for optimal univariate microaggregation, IEEE Transactions on Knowledge and Data Engineering 15(4) (2003) 1043-1044.
  • (24) A. Oganian, J. Domingo-Ferrer, On the complexity of optimal microaggregation for statistical disclosure control, Statistical Journal of the United Nations Economic Commission for Europe 18(4) (2001) 345-354.
  • (25) J. Domingo-Ferrer, U. González-Nicolás, Hybrid microdata using microaggregation, Information Sciences 180(15) (2010) 2834-2844.
  • (26) S. Martínez, D. Sánchez, A. Valls, Semantic adaptive microaggregation of categorical microdata, Computers and Security 31(5) (2012), 653-672.
  • (27) A. Blum, K. Ligett, A. Roth, A learning theory approach to non-interactive database privacy, in: Proceedings of the 40th Annual Symposium on the Theory of Computing-STOC, 2008, pp. 609-618.
  • (28) C. Dwork, M. Naor, O. Reingold, G.N. Rothblum, S. Vadhan, On the complexity of differentially private data release: efficient algorithms and hardness results, in: Proceedings of the 41st Annual Symposium on the Theory of Computing-STOC, 2009, pp. 381-390.
  • (29) M. Hardt, K. Ligett, F. McSherry, A simple and practical algorithm for differentially private data release, in: Advances in Neural Information Processing Systems, 2012.
  • (30) R. Chen, N. Mohammed, B.C.M. Fung, D.C. Desai, L. Xiong, Publishing set-valued data via differential privacy, in: 37th International Conference on Very Large Data Bases-VLDB 2011/Proc. of the VLDB Endowment 4(11) (2011) 1087-1098.
  • (31) Y. Xiao, L. Xiong, C. Yuan, Differentially private data release through multidimensional partitioning, in: Proceedings of the 7th VLDB Conference on Secure Data Management, 2010, pp. 150-168.
  • (32) J. Xu, Z. Zhang, X. Xiao, Y. Yang, G. Yu, Differentially private histogram publication, in: Proceedings of the IEEE International Conference on Data Engineering, 2012, pp. 32-43.
  • (33) A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, L. Vilhuber, Privacy: theory meets practice on the map, in: Proceedings of the IEEE International Conference on Data Engineering, 2008, pp. 277-286.
  • (34) M. Hay, V. Rastogi, G. Miklau, D. Suciu, Boosting the accuracy of differentially private histograms through consistency, Proceedings of the VLDB Endowment 3(1) (2010) 1021-1032.
  • (35) X. Xiao, G. Wang, J. Gehrke, Differential privacy via wavelet transforms, IEEE Transactions on Knowledge and Data Engineering 23(8) (2010) 1200-1214.
  • (36) N. Li, W. Yang, W. Qardaji, Differentially private grids for geospatial data, in: Proceeding of the IEEE International Conference on Data Engineering, 2013, pp. 757-768.
  • (37) G. Cormode, C.M. Procopiuc, E. Shen, D. Srivastava, T. Yu, Differentially private spatial decompositions, in: Proceedings of the IEEE International Conference on Data Engineering, 2012, pp. 20-31.
  • (38) N. Mohammed, R. Chen, B.C.M. Fung, P.S. Yu, Differentially private data release for data mining, in: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011, pp. 493–501.
  • (39) D.J. Mir, S. Isaacman, R. Caceres, M. Martonosi, R.N. Wright, DP-WHERE: Differentially private modeling of human mobility, in: Proceedings of the IEEE International Conference on Big Data, 2013, pp. 580-588.
  • (40) J. Zhang, G. Cormode, C.M. Procopiuc, D. Srivastava, X. Xiao, PrivBayes: private data release via bayesian networks, in: Proceedings of the ACM SIGMOD International Conference on Management of Data, 2014, pp. 1423-1434.
  • (41) J. Soria-Comas, J. Domingo-Ferrer, Probabilistic -anonymity through microaggregation and data swapping, in: Proceedings of the IEEE International Conference on Fuzzy Systems, 2012, pp. 1-8.
  • (42) G. Kellaris, S. Papadopoulos, Practical differential privacy via grouping and smoothing, Proceedings of the VLDB Endowment 6(5) (2013) 301-312.
  • (43) F. McSherry, Privacy integrated queries: an extensible platform for privacy-preserving data analysis, in: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, 2009, pp. 19-30.
  • (44) D. Sánchez, M. Batet, D. Isern, A. Valls, Ontology-based semantic similarity: a new feature-based approach, Expert Systems with Applications 39(9) (2012) 7718-7728.
  • (45) J. Domingo-Ferrer, D. Sánchez, G. Rufian-Torrell, Anonymization of nominal data based on semantic marginality, Information Sciences 242 (2013) 35-48.
  • (46) S. Martínez, A. Valls, D. Sánchez, Semantically-grounded construction of centroids for data sets with textual attributes, Knowledge-Based Systems 35 (2012) 160-172.
  • (47) F. McSherry, K. Talwar, Mechanism design via differential privacy, in: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007, pp. 94-103.
  • (48) R. Brand, J. Domingo-Ferrer, J.M. Mateo-Sanz, Reference data sets to test and compare SDC methods for protection of numerical microdata, European Project IST-2000-25069 CASC, 2002, http://neon.vb.cbs.nl/casc
  • (49) R. Dandekar, J. Domingo-Ferrer, F. Sebé, LHS-based hybrid microdata vs rank swapping and microaggregation for numeric microdata protection, in: Inference Control in Statistical Databases, LNCS 2316, Springer, 2002, pp. 153-162.
  • (50) W.E. Yancey, W.E. Winkler, R.H. Creecy, Disclosure risk assessment in perturbative microdata protection, in: Inference Control in Statistical Databases, LNCS 2316, Springer, 2002, pp. 135-152.
  • (51) M. Laszlo, S. Mukherjee, Minimum spanning tree partitioning algorithm for microaggregation, IEEE Transactions on Knowledge and Data Engineering 17(7) (2005) 902-911.
  • (52) A. Frank, A. Asuncion, UCI Machine Learning Repository, University of California, School of Information and Computer Science, 2010, http://archive.ics.uci.edu/ml/datasets/Adult
  • (53) C. Fellbaum, WordNet: An Electronic Lexical Database (Language, Speech, and Communication), The MIT Press, 1998.
  • (54) X. Xiao, G. Bender, M. Hay, J. Gehrke, iReduct: differential privacy with reduced relative errors, in: Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, 2011, pp. 229-240.
  • (55) Y. Baeyens, D. Defays, Estimation of variance loss following microaggregation by the individual ranking method, in: Statistical Data Protection, 1999, pp. 101-108.
  • (56) J. Lin, Divergence measures based on the shannon entropy, IEEE Transactions on Information Theory 37(1) (1991) 145-151.
  • (57) C. Dwork, A firm foundation for private data analysis, Communications of the ACM 54(1) (2011) 86-95.
  • (58) A.-S. Charest, How can we analyze differentially-private synthetic data sets? Journal of Privacy and Confidentiality 2(2) (2010) 21-33.
  • (59) A.-S. Charest, Empirical evaluation of statistical inference from differentially-private contingency tables, in: Privacy in Statistical Databases, LNCS 7556, Springer, 2012, pp. 257-272.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
Add comment
Loading ...
This is a comment super asjknd jkasnjk adsnkj
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test description