Permutation anonymization

Dong Li, Xianmang He*, LongBin Cao, Huahui Chen

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

16 Citations (Scopus)


In data publishing, anonymization techniques have been designed to provide privacy protection. Anatomy is an important techniques for privacy preserving in data publication and attracts considerable attention in the literature. However, anatomy is fragile under background knowledge attack and the presence attack. In addition, anatomy can only be applied into limited applications. To overcome these drawbacks, we propose an improved version of anatomy: permutation anonymization, a new anonymization technique that is more effective than anatomy in privacy protection, and in the meanwhile is able to retain significantly more information in the microdata. We present the detail of the technique and build the underlying theory of the technique. Extensive experiments on real data are conducted, showing that our technique allows highly effective data analysis, while offering strong privacy guarantees.

Original languageEnglish
Pages (from-to)427-445
Number of pages19
JournalJournal of Intelligent Information Systems
Issue number3
Publication statusPublished - Dec 2016
Externally publishedYes


  • Privacy preservation
  • Generalization
  • Anatomy
  • Permutation anonymization


Dive into the research topics of 'Permutation anonymization'. Together they form a unique fingerprint.

Cite this