SlideShare a Scribd company logo
Defamation Caused
by Anonymization
Hiroshi Nakagawa
(The University of Tokyo)
name age sex address Location at 2016/6/6 12:00
John 35 M Bunkyo hongo 11 K consumer finance shop
Dan 30 M Bunkyo Yusima 22 T University
Jack 33 M Bunkyo Yayoi 33 T University
Bill 39 M Bunkyo Nezu 44 Y hospital
name age sex address Location at 2016/6/6 12:00
John 30’s M Bunkyo K consumer finance shop
Dan 30’s M Bunkyo T University
Jack 30’s M Bunkyo T University
Bill 30’s M Bunkyo Y hospital
4-anonymize
Dan , Jack and Bill are not recognized a person different
from John by 4-anonyumity, all four persons are suspected
to stay at K consumer finance shopk-anonymization
provokes defamation on Dan, Jack and Bill.
k-anonymity provokes defamation
in sub area aggregation
k-anonymmized area : at
least k people are in this area
consumer
finance
shop
This university student who is
trying to find a job, is
suspected to stay at consumer
finance shop, and this situation
is not good for his job seeking
process.
Defama
tion
Why defamation happens?
• Case study
– A job candidate who is a good university student.
– He is in k people group that includes at least one
person who went to a consumer finance shop.
– A company he tries to take entrance examination
does not want hire a person who goes to a
consumer finance shop.
– He is suspected to go to a consumer finance
shop. defamation!
Back ground situation of defamation
• Case study cont.
– If the company deletes him from candidates, it must
use another time and money, say X, to check another
candidate:
– If the company hires a bad buy, it will suffer a certain
amount of damage, say Y, by his bad behavior.
– Then if the expected value of Y is more than X, the
company becomes very negative, otherwise not
negative about him.
– This is a defamation model from an economical point of
view.
Back ground situation of defamation
• Case study cont.
– Another factor is the probability that he actually
went to a consumer finance shop.
– This probability is proportional to the number of
consumer finance shop visitors, say s, in k people of
k-anonymity group = s/k.
– Y is proportional to s/k
– Then the relation is sketched in the figure on next
slide.
1
0 1
The subjective
probability of the
company suspects him
The expected
damage if the
company hires
him
The money
the company
has to spend
for checking
another
candidate
s/k
In this area, the company does
not pay if it suspects him
In this area, the company
should suspect him to avoid
the expected damage
C
The border
line between
defamation or
not
Solution
• Then the solution is simple:
– Make the border line as small as possible.
– But how?
• We can revise k-anonymization algorithm in order to
minimize the number of bad behavior guys in k-
anonymity group.
– This revision, however, reduce the accuracy of the data.
– Then the problem comes to be a optimization problem:
Maximize Accuracy of data
subject to number of bad guys ≤ 1
in k-anonymity group
Outline of proposed algorithm
1. Do k-anonymization.
2. If one group includes more than one bad guys
① Then combine this and two nearest groups
② Do k-anonymization to this combined group to make
two groups that includes at most one bad guys.
③ If step ② fails,
④ then go back to one step in 1. Do k-anonymization,
namely try to find another generalization in k-
anonymization.
A consumer finance shop is devided into 4 parts to
reduce # of poepole visit it is less or equal than one
K-anonymity area isdevided
into 4 areas
A concumer
finance
shop
name age sex address Location at 2016/6/6 12:00
John 35 M Bunkyo hongo 11 K consumer finance shop
Dan 30 M Bunkyo Yusima 22 K consumer finance shop
Jack 33 M Bunkyo Yayoi 33 K consumer finance shop
Bill 39 M Bunkyo Nezu 44 K consumer finance shop
Exchange one person to
make DB 2-diversity
By 2-diversifying, Ales becomes strongly suspected to be at K
consumer finance shop  l-diversity provokes defamation
l-diversity makes situation worse
These values shows all four is
at K consumer finance shop
name age sex address Location at 2016/6/6 12:00
John 30’s M Bunkyo K consumer finance shop
Dan 30’s M Bunkyo K consumer finance shop
Jack 30’s M Bunkyo K consumer finance shop
Alex 30’s M Bunkyo T Univeristy
Thank you
for your attention

More Related Content

Similar to Defamation Caused by Anonymization

The Grapes Of Wrath Essay Questions
The Grapes Of Wrath Essay QuestionsThe Grapes Of Wrath Essay Questions
The Grapes Of Wrath Essay Questions
Linda Roy
 
How To Write An Informative Essay Examples - Sample
How To Write An Informative Essay Examples - SampleHow To Write An Informative Essay Examples - Sample
How To Write An Informative Essay Examples - Sample
Michelle Madero
 
Ap English Synthesis Essay Rubric. Online assignment writing service.
Ap English Synthesis Essay Rubric. Online assignment writing service.Ap English Synthesis Essay Rubric. Online assignment writing service.
Ap English Synthesis Essay Rubric. Online assignment writing service.
Lisa Williams
 
Psychology Extended Essay Samples. Online assignment writing service.
Psychology Extended Essay Samples. Online assignment writing service.Psychology Extended Essay Samples. Online assignment writing service.
Psychology Extended Essay Samples. Online assignment writing service.
Jenny Gomez
 
English Essay Acronyms. Online assignment writing service.
English Essay Acronyms. Online assignment writing service.English Essay Acronyms. Online assignment writing service.
English Essay Acronyms. Online assignment writing service.
Nicole Olson
 
Types of Claims.pptx
Types of Claims.pptxTypes of Claims.pptx
Types of Claims.pptx
RomelNebab1
 
Resolution Writing By Drida Delivered Teachers Pay
Resolution Writing By Drida Delivered  Teachers PayResolution Writing By Drida Delivered  Teachers Pay
Resolution Writing By Drida Delivered Teachers Pay
Leslie Thomas
 
Trade Unions Uk Essay. Online assignment writing service.
Trade Unions Uk Essay. Online assignment writing service.Trade Unions Uk Essay. Online assignment writing service.
Trade Unions Uk Essay. Online assignment writing service.
Mimi Young
 
Essay Writing Contest For High School And College S
Essay Writing Contest For High School And College SEssay Writing Contest For High School And College S
Essay Writing Contest For High School And College S
Beth Salazar
 
4Th Grade Essay Questions
4Th Grade Essay Questions4Th Grade Essay Questions
4Th Grade Essay Questions
Julie Johnson
 
4Th Grade Essay Questions
4Th Grade Essay Questions4Th Grade Essay Questions
4Th Grade Essay Questions
Jennifer Mower
 
4Th Grade Essay Questions
4Th Grade Essay Questions4Th Grade Essay Questions
4Th Grade Essay Questions
Beth Hall
 
Free Page Borders For Kids - ClipArt Best
Free Page Borders For Kids - ClipArt BestFree Page Borders For Kids - ClipArt Best
Free Page Borders For Kids - ClipArt Best
Melissa Wilson
 
Tips On How To Write An Essay About Yourself. Tips
Tips On How To Write An Essay About Yourself. TipsTips On How To Write An Essay About Yourself. Tips
Tips On How To Write An Essay About Yourself. Tips
Deborah Gastineau
 

Similar to Defamation Caused by Anonymization (15)

The Grapes Of Wrath Essay Questions
The Grapes Of Wrath Essay QuestionsThe Grapes Of Wrath Essay Questions
The Grapes Of Wrath Essay Questions
 
How To Write An Informative Essay Examples - Sample
How To Write An Informative Essay Examples - SampleHow To Write An Informative Essay Examples - Sample
How To Write An Informative Essay Examples - Sample
 
Ap English Synthesis Essay Rubric. Online assignment writing service.
Ap English Synthesis Essay Rubric. Online assignment writing service.Ap English Synthesis Essay Rubric. Online assignment writing service.
Ap English Synthesis Essay Rubric. Online assignment writing service.
 
Psychology Extended Essay Samples. Online assignment writing service.
Psychology Extended Essay Samples. Online assignment writing service.Psychology Extended Essay Samples. Online assignment writing service.
Psychology Extended Essay Samples. Online assignment writing service.
 
mm212 powerpoint math hs final
mm212 powerpoint math hs finalmm212 powerpoint math hs final
mm212 powerpoint math hs final
 
English Essay Acronyms. Online assignment writing service.
English Essay Acronyms. Online assignment writing service.English Essay Acronyms. Online assignment writing service.
English Essay Acronyms. Online assignment writing service.
 
Types of Claims.pptx
Types of Claims.pptxTypes of Claims.pptx
Types of Claims.pptx
 
Resolution Writing By Drida Delivered Teachers Pay
Resolution Writing By Drida Delivered  Teachers PayResolution Writing By Drida Delivered  Teachers Pay
Resolution Writing By Drida Delivered Teachers Pay
 
Trade Unions Uk Essay. Online assignment writing service.
Trade Unions Uk Essay. Online assignment writing service.Trade Unions Uk Essay. Online assignment writing service.
Trade Unions Uk Essay. Online assignment writing service.
 
Essay Writing Contest For High School And College S
Essay Writing Contest For High School And College SEssay Writing Contest For High School And College S
Essay Writing Contest For High School And College S
 
4Th Grade Essay Questions
4Th Grade Essay Questions4Th Grade Essay Questions
4Th Grade Essay Questions
 
4Th Grade Essay Questions
4Th Grade Essay Questions4Th Grade Essay Questions
4Th Grade Essay Questions
 
4Th Grade Essay Questions
4Th Grade Essay Questions4Th Grade Essay Questions
4Th Grade Essay Questions
 
Free Page Borders For Kids - ClipArt Best
Free Page Borders For Kids - ClipArt BestFree Page Borders For Kids - ClipArt Best
Free Page Borders For Kids - ClipArt Best
 
Tips On How To Write An Essay About Yourself. Tips
Tips On How To Write An Essay About Yourself. TipsTips On How To Write An Essay About Yourself. Tips
Tips On How To Write An Essay About Yourself. Tips
 

More from Hiroshi Nakagawa

人工知能学会大会2020ーAI倫理とガバナンス
人工知能学会大会2020ーAI倫理とガバナンス人工知能学会大会2020ーAI倫理とガバナンス
人工知能学会大会2020ーAI倫理とガバナンス
Hiroshi Nakagawa
 
信頼できるAI評価リスト パーソナルAIエージェントへの適用例
信頼できるAI評価リスト パーソナルAIエージェントへの適用例信頼できるAI評価リスト パーソナルAIエージェントへの適用例
信頼できるAI評価リスト パーソナルAIエージェントへの適用例
Hiroshi Nakagawa
 
NICT-nakagawa2019Feb12
NICT-nakagawa2019Feb12NICT-nakagawa2019Feb12
NICT-nakagawa2019Feb12
Hiroshi Nakagawa
 
情報ネットワーク法学会研究大会
情報ネットワーク法学会研究大会情報ネットワーク法学会研究大会
情報ネットワーク法学会研究大会
Hiroshi Nakagawa
 
最近のAI倫理指針からの考察
最近のAI倫理指針からの考察最近のAI倫理指針からの考察
最近のAI倫理指針からの考察
Hiroshi Nakagawa
 
AI and Accountability
AI and AccountabilityAI and Accountability
AI and Accountability
Hiroshi Nakagawa
 
AI Forum-2019_Nakagawa
AI Forum-2019_NakagawaAI Forum-2019_Nakagawa
AI Forum-2019_Nakagawa
Hiroshi Nakagawa
 
2019 3-9-nakagawa
2019 3-9-nakagawa2019 3-9-nakagawa
2019 3-9-nakagawa
Hiroshi Nakagawa
 
CPDP2019 summary-report
CPDP2019 summary-reportCPDP2019 summary-report
CPDP2019 summary-report
Hiroshi Nakagawa
 
情報法制研究所 第5回情報法セミナー:人工知能倫理と法制度、社会
情報法制研究所 第5回情報法セミナー:人工知能倫理と法制度、社会情報法制研究所 第5回情報法セミナー:人工知能倫理と法制度、社会
情報法制研究所 第5回情報法セミナー:人工知能倫理と法制度、社会
Hiroshi Nakagawa
 
Ai e-accountability
Ai e-accountabilityAi e-accountability
Ai e-accountability
Hiroshi Nakagawa
 
自動運転と道路沿い情報インフラ
自動運転と道路沿い情報インフラ自動運転と道路沿い情報インフラ
自動運転と道路沿い情報インフラ
Hiroshi Nakagawa
 
暗号化によるデータマイニングと個人情報保護
暗号化によるデータマイニングと個人情報保護暗号化によるデータマイニングと個人情報保護
暗号化によるデータマイニングと個人情報保護
Hiroshi Nakagawa
 
人工知能と社会
人工知能と社会人工知能と社会
人工知能と社会
Hiroshi Nakagawa
 
人工知能学会合同研究会2017-汎用人工知能研究会(SIG-AGI)招待講演
人工知能学会合同研究会2017-汎用人工知能研究会(SIG-AGI)招待講演人工知能学会合同研究会2017-汎用人工知能研究会(SIG-AGI)招待講演
人工知能学会合同研究会2017-汎用人工知能研究会(SIG-AGI)招待講演
Hiroshi Nakagawa
 
情報ネットワーク法学会2017大会第8分科会発表資料
情報ネットワーク法学会2017大会第8分科会発表資料情報ネットワーク法学会2017大会第8分科会発表資料
情報ネットワーク法学会2017大会第8分科会発表資料
Hiroshi Nakagawa
 
学術会議 ITシンポジウム資料「プライバシー保護技術の概観と展望」
学術会議 ITシンポジウム資料「プライバシー保護技術の概観と展望」学術会議 ITシンポジウム資料「プライバシー保護技術の概観と展望」
学術会議 ITシンポジウム資料「プライバシー保護技術の概観と展望」
Hiroshi Nakagawa
 
AI社会論研究会
AI社会論研究会AI社会論研究会
AI社会論研究会
Hiroshi Nakagawa
 
Social Effects by the Singularity -Pre-Singularity Era-
Social Effects by the Singularity  -Pre-Singularity Era-Social Effects by the Singularity  -Pre-Singularity Era-
Social Effects by the Singularity -Pre-Singularity Era-
Hiroshi Nakagawa
 
パーソナル履歴データに対する匿名化と再識別:SCIS2017
パーソナル履歴データに対する匿名化と再識別:SCIS2017パーソナル履歴データに対する匿名化と再識別:SCIS2017
パーソナル履歴データに対する匿名化と再識別:SCIS2017
Hiroshi Nakagawa
 

More from Hiroshi Nakagawa (20)

人工知能学会大会2020ーAI倫理とガバナンス
人工知能学会大会2020ーAI倫理とガバナンス人工知能学会大会2020ーAI倫理とガバナンス
人工知能学会大会2020ーAI倫理とガバナンス
 
信頼できるAI評価リスト パーソナルAIエージェントへの適用例
信頼できるAI評価リスト パーソナルAIエージェントへの適用例信頼できるAI評価リスト パーソナルAIエージェントへの適用例
信頼できるAI評価リスト パーソナルAIエージェントへの適用例
 
NICT-nakagawa2019Feb12
NICT-nakagawa2019Feb12NICT-nakagawa2019Feb12
NICT-nakagawa2019Feb12
 
情報ネットワーク法学会研究大会
情報ネットワーク法学会研究大会情報ネットワーク法学会研究大会
情報ネットワーク法学会研究大会
 
最近のAI倫理指針からの考察
最近のAI倫理指針からの考察最近のAI倫理指針からの考察
最近のAI倫理指針からの考察
 
AI and Accountability
AI and AccountabilityAI and Accountability
AI and Accountability
 
AI Forum-2019_Nakagawa
AI Forum-2019_NakagawaAI Forum-2019_Nakagawa
AI Forum-2019_Nakagawa
 
2019 3-9-nakagawa
2019 3-9-nakagawa2019 3-9-nakagawa
2019 3-9-nakagawa
 
CPDP2019 summary-report
CPDP2019 summary-reportCPDP2019 summary-report
CPDP2019 summary-report
 
情報法制研究所 第5回情報法セミナー:人工知能倫理と法制度、社会
情報法制研究所 第5回情報法セミナー:人工知能倫理と法制度、社会情報法制研究所 第5回情報法セミナー:人工知能倫理と法制度、社会
情報法制研究所 第5回情報法セミナー:人工知能倫理と法制度、社会
 
Ai e-accountability
Ai e-accountabilityAi e-accountability
Ai e-accountability
 
自動運転と道路沿い情報インフラ
自動運転と道路沿い情報インフラ自動運転と道路沿い情報インフラ
自動運転と道路沿い情報インフラ
 
暗号化によるデータマイニングと個人情報保護
暗号化によるデータマイニングと個人情報保護暗号化によるデータマイニングと個人情報保護
暗号化によるデータマイニングと個人情報保護
 
人工知能と社会
人工知能と社会人工知能と社会
人工知能と社会
 
人工知能学会合同研究会2017-汎用人工知能研究会(SIG-AGI)招待講演
人工知能学会合同研究会2017-汎用人工知能研究会(SIG-AGI)招待講演人工知能学会合同研究会2017-汎用人工知能研究会(SIG-AGI)招待講演
人工知能学会合同研究会2017-汎用人工知能研究会(SIG-AGI)招待講演
 
情報ネットワーク法学会2017大会第8分科会発表資料
情報ネットワーク法学会2017大会第8分科会発表資料情報ネットワーク法学会2017大会第8分科会発表資料
情報ネットワーク法学会2017大会第8分科会発表資料
 
学術会議 ITシンポジウム資料「プライバシー保護技術の概観と展望」
学術会議 ITシンポジウム資料「プライバシー保護技術の概観と展望」学術会議 ITシンポジウム資料「プライバシー保護技術の概観と展望」
学術会議 ITシンポジウム資料「プライバシー保護技術の概観と展望」
 
AI社会論研究会
AI社会論研究会AI社会論研究会
AI社会論研究会
 
Social Effects by the Singularity -Pre-Singularity Era-
Social Effects by the Singularity  -Pre-Singularity Era-Social Effects by the Singularity  -Pre-Singularity Era-
Social Effects by the Singularity -Pre-Singularity Era-
 
パーソナル履歴データに対する匿名化と再識別:SCIS2017
パーソナル履歴データに対する匿名化と再識別:SCIS2017パーソナル履歴データに対する匿名化と再識別:SCIS2017
パーソナル履歴データに対する匿名化と再識別:SCIS2017
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 

Defamation Caused by Anonymization

  • 1. Defamation Caused by Anonymization Hiroshi Nakagawa (The University of Tokyo)
  • 2. name age sex address Location at 2016/6/6 12:00 John 35 M Bunkyo hongo 11 K consumer finance shop Dan 30 M Bunkyo Yusima 22 T University Jack 33 M Bunkyo Yayoi 33 T University Bill 39 M Bunkyo Nezu 44 Y hospital name age sex address Location at 2016/6/6 12:00 John 30’s M Bunkyo K consumer finance shop Dan 30’s M Bunkyo T University Jack 30’s M Bunkyo T University Bill 30’s M Bunkyo Y hospital 4-anonymize Dan , Jack and Bill are not recognized a person different from John by 4-anonyumity, all four persons are suspected to stay at K consumer finance shopk-anonymization provokes defamation on Dan, Jack and Bill.
  • 3. k-anonymity provokes defamation in sub area aggregation k-anonymmized area : at least k people are in this area consumer finance shop This university student who is trying to find a job, is suspected to stay at consumer finance shop, and this situation is not good for his job seeking process. Defama tion
  • 4. Why defamation happens? • Case study – A job candidate who is a good university student. – He is in k people group that includes at least one person who went to a consumer finance shop. – A company he tries to take entrance examination does not want hire a person who goes to a consumer finance shop. – He is suspected to go to a consumer finance shop. defamation!
  • 5. Back ground situation of defamation • Case study cont. – If the company deletes him from candidates, it must use another time and money, say X, to check another candidate: – If the company hires a bad buy, it will suffer a certain amount of damage, say Y, by his bad behavior. – Then if the expected value of Y is more than X, the company becomes very negative, otherwise not negative about him. – This is a defamation model from an economical point of view.
  • 6. Back ground situation of defamation • Case study cont. – Another factor is the probability that he actually went to a consumer finance shop. – This probability is proportional to the number of consumer finance shop visitors, say s, in k people of k-anonymity group = s/k. – Y is proportional to s/k – Then the relation is sketched in the figure on next slide.
  • 7. 1 0 1 The subjective probability of the company suspects him The expected damage if the company hires him The money the company has to spend for checking another candidate s/k In this area, the company does not pay if it suspects him In this area, the company should suspect him to avoid the expected damage C The border line between defamation or not
  • 8. Solution • Then the solution is simple: – Make the border line as small as possible. – But how? • We can revise k-anonymization algorithm in order to minimize the number of bad behavior guys in k- anonymity group. – This revision, however, reduce the accuracy of the data. – Then the problem comes to be a optimization problem: Maximize Accuracy of data subject to number of bad guys ≤ 1 in k-anonymity group
  • 9. Outline of proposed algorithm 1. Do k-anonymization. 2. If one group includes more than one bad guys ① Then combine this and two nearest groups ② Do k-anonymization to this combined group to make two groups that includes at most one bad guys. ③ If step ② fails, ④ then go back to one step in 1. Do k-anonymization, namely try to find another generalization in k- anonymization.
  • 10. A consumer finance shop is devided into 4 parts to reduce # of poepole visit it is less or equal than one K-anonymity area isdevided into 4 areas A concumer finance shop
  • 11. name age sex address Location at 2016/6/6 12:00 John 35 M Bunkyo hongo 11 K consumer finance shop Dan 30 M Bunkyo Yusima 22 K consumer finance shop Jack 33 M Bunkyo Yayoi 33 K consumer finance shop Bill 39 M Bunkyo Nezu 44 K consumer finance shop Exchange one person to make DB 2-diversity By 2-diversifying, Ales becomes strongly suspected to be at K consumer finance shop  l-diversity provokes defamation l-diversity makes situation worse These values shows all four is at K consumer finance shop name age sex address Location at 2016/6/6 12:00 John 30’s M Bunkyo K consumer finance shop Dan 30’s M Bunkyo K consumer finance shop Jack 30’s M Bunkyo K consumer finance shop Alex 30’s M Bunkyo T Univeristy
  • 12. Thank you for your attention