Skip to main content

Showing 1–9 of 9 results for author: Soria-Comas, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.13712  [pdf, other

    cs.CR

    Conciliating Privacy and Utility in Data Releases via Individual Differential Privacy and Microaggregation

    Authors: Jordi Soria-Comas, David Sánchez, Josep Domingo-Ferrer, Sergio Martínez, Luis Del Vasto-Terrientes

    Abstract: $ε$-Differential privacy (DP) is a well-known privacy model that offers strong privacy guarantees. However, when applied to data releases, DP significantly deteriorates the analytical utility of the protected outcomes. To keep data utility at reasonable levels, practical applications of DP to data releases have used weak privacy parameters (large $ε… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: 17 pages, 6 figures

  2. arXiv:2010.10881  [pdf, other

    cs.CR cs.DS

    Multi-Dimensional Randomized Response

    Authors: Josep Domingo-Ferrer, Jordi Soria-Comas

    Abstract: In our data world, a host of not necessarily trusted controllers gather data on individual subjects. To preserve her privacy and, more generally, her informational self-determination, the individual has to be empowered by giving her agency on her own data. Maximum agency is afforded by local anonymization, that allows each individual to anonymize her own data before handing them to the data contro… ▽ More

    Submitted 19 December, 2020; v1 submitted 21 October, 2020; originally announced October 2020.

    Comments: IEEE Transactions on Knowledge and Data Engineering, to appear. (First version submitted on May 8, 2019 as TKDE-2019-05-0430; first revision submitted on July 13, 2020 as TKDE-2019-05-0430.R1; second revision submitted on Nov. 5, 2020 as TKDE-2019-05-0430.R2 and accepted without changes on Dec. 16, 2020)

  3. arXiv:1803.02139  [pdf, ps, other

    cs.CR

    Connecting Randomized Response, Post-Randomization, Differential Privacy and t-Closeness via Deniability and Permutation

    Authors: Josep Domingo-Ferrer, Jordi Soria-Comas

    Abstract: We explore some novel connections between the main privacy models in use and we recall a few known ones. We show these models to be more related than commonly understood, around two main principles: deniability and permutation. In particular, randomized response turns out to be very modern in spite of it having been introduced over 50 years ago: it is a local anonymization method and it allows und… ▽ More

    Submitted 6 March, 2018; originally announced March 2018.

    Comments: Submitted manuscript

    MSC Class: 68P99 ACM Class: H.2.7; K.4.1

  4. Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees

    Authors: Jordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez, David Megías

    Abstract: Differential privacy is a popular privacy model within the research community because of the strong privacy guarantee it offers, namely that the presence or absence of any individual in a data set does not significantly influence the results of analyses on the data set. However, enforcing this strict guarantee in practice significantly distorts data and/or limits data uses, thus diminishing the an… ▽ More

    Submitted 8 February, 2017; v1 submitted 7 December, 2016; originally announced December 2016.

  5. From t-closeness to differential privacy and vice versa in data anonymization

    Authors: J. Domingo-Ferrer, J. Soria-Comas

    Abstract: k-Anonymity and ε-differential privacy are two mainstream privacy models, the former introduced to anonymize data sets and the latter to limit the knowledge gain that results from including one individual in the data set. Whereas basic k-anonymity only protects against identity disclosure, t-closeness was presented as an extension of k-anonymity that also protects against attribute disclosure. We… ▽ More

    Submitted 21 December, 2015; v1 submitted 16 December, 2015; originally announced December 2015.

    Journal ref: Knowledge-Based Systems, Vol. 74, pp. 151-158, 2015

  6. t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation

    Authors: Jordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez, Sergio Martínez

    Abstract: Microaggregation is a technique for disclosure limitation aimed at protecting the privacy of data subjects in microdata releases. It has been used as an alternative to generalization and suppression to generate $k$-anonymous data sets, where the identity of each subject is hidden within a group of $k$ subjects. Unlike generalization, microaggregation perturbs the data and this additional masking f… ▽ More

    Submitted 9 December, 2015; originally announced December 2015.

    Journal ref: IEEE Transactions on Knowledge & Data Engineering 27(11): 3098-3110 (2015)

  7. Utility-Preserving Differentially Private Data Releases Via Individual Ranking Microaggregation

    Authors: David Sánchez, Josep Domingo-Ferrer, Sergio Martínez, Jordi Soria-Comas

    Abstract: Being able to release and exploit open data gathered in information systems is crucial for researchers, enterprises and the overall society. Yet, these data must be anonymized before release to protect the privacy of the subjects to whom the records relate. Differential privacy is a privacy model for anonymization that offers more robust privacy guarantees than previous models, such as $k$-anonymi… ▽ More

    Submitted 16 December, 2015; v1 submitted 9 December, 2015; originally announced December 2015.

    Journal ref: Information Fusion 30:1-14 (2016)

  8. Co-Utility: Self-Enforcing Protocols without Coordination Mechanisms

    Authors: Josep Domingo-Ferrer, Jordi Soria-Comas, Oana Ciobotaru

    Abstract: Performing some task among a set of agents requires the use of some protocol that regulates the interactions between them. If those agents are rational, they may try to subvert the protocol for their own benefit, in an attempt to reach an outcome that provides greater utility. We revisit the traditional notion of self-enforcing protocols implemented using existing game-theoretic solution concepts,… ▽ More

    Submitted 9 March, 2015; originally announced March 2015.

    Comments: Proceedings of the 2015 International Conference on Industrial Engineering and Operations Management-IEOM 2015, Dubai, United Arab Emirates, March 3-5, 2015. To appear in IEEE Explore

    MSC Class: 91Axx ACM Class: K.4.1

  9. arXiv:1307.0966  [pdf, other

    cs.CR cs.DB

    Improving data utility in differential privacy and k-anonymity

    Authors: Jordi Soria-Comas

    Abstract: We focus on two mainstream privacy models: k-anonymity and differential privacy. Once a privacy model has been selected, the goal is to enforce it while preserving as much data utility as possible. The main objective of this thesis is to improve the data utility in k-anonymous and differentially private data releases. k-Anonymity has several drawbacks. On the disclosure limitation side, there is a… ▽ More

    Submitted 3 July, 2013; originally announced July 2013.

    Comments: Ph.D. Thesis defended on June 14, 2013, at the Department of Computer Engineering and Mathematics of Universitat Rovira i Virgili. Advisor: Josep Domingo-Ferrer

    ACM Class: K.4.1