Disclosure risk vs. data utility: The RU confidentiality map

  • Duncan G
  • Keller-McNulty S
  • Stokes S
ISSN: 0933-2480
N/ACitations
Citations of this article
33Readers
Mendeley users who have this article in their library.

Abstract

Information organizations (IOs) must provide data products that are both useful and have low risk of confidentiality disclosure. Recognizing that deidentification of data is generally inadequate to protect their confidentiality against attack by a data snooper, concerned IOs can apply disclosure limitation techniques to the original data. Desirably, the resulting restricted data have both high data utility U to users (analytically valid data) and low disclosure risk R (safe data). This article shows the promise of the R-U confidentiality map, a chart that traces the impact on R and U of changes in the parameters of a disclosure limitation procedure. Theory for the R-U confidentiality map is developed for additive noise applied to univariate data under various scenarios of data snooper attack. These scenarios are predicated on different knowledge states for the data snooper. A demonstration is provided of how to implement the theory for a real database. Through simulation methods, this leads to an empirical R-U confidentiality map. Application is made to data from a National Center for Education Statistics (NCES) survey, the

Cite

CITATION STYLE

APA

Duncan, G. T., Keller-McNulty, S. a., & Stokes, S. L. (2001). Disclosure risk vs. data utility: The RU confidentiality map. Technical Report LA-UR-01-6428, Statistical Sciences Group, Los Alamos National Laboratory, (121), 1–30. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.1598

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free