Skip to main content

Computational Experiments with Minimum-Distance Controlled Perturbation Methods

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3050))

Abstract

Minimum-distance controlled perturbation is a recent family of methods for the protection of statistical tabular data. These methods are both efficient and versatile, since can deal with large tables of any structure and dimension, and in practice only need the solution of a linear or quadratic optimization problem. The purpose of this paper is to give insight into the behaviour of such methods through some computational experiments. In particular, the paper (1) illustrates the theoretical results about the low disclosure risk of the method; (2) analyzes the solutions provided by the method on a standard set of seven difficult and complex instances; and (3) shows the behaviour of a new approach obtained by the combination of two existing ones.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carvalho, F.D., Dellaert, N.P., Osório, M.D.: Statistical disclosure in twodimensional tables: general tables. J. Am. Stat. Assoc. 89, 1547–1557 (1994)

    Article  MATH  Google Scholar 

  2. Castro, J.: A specialized interior-point algorithm for multicommodity network flows. SIAM J. on Opt. 10, 852–877 (2000)

    Article  MATH  Google Scholar 

  3. Castro, J.: Internal communication to partners of the European Union IST-2000- 25069 CASC project (2002)

    Google Scholar 

  4. Castro, J.: Network flows heuristics for complementary cell suppression: an empirical evaluation and extensions. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol. 2316, pp. 59–73. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Castro, J.: Quadratic interior-point methods in statistical disclosure control, Computational Management Science (2004) (in press), Previously appeared as Research Report DR 2003/10, Dept. of Statistics and Operations Research, Universitat Politècnica de Catalunya (2003), Available from the author webpage

    Google Scholar 

  6. Castro, J.: Minimum-distance controlled perturbation methods for large-scale tabular data protection. European Journal of Operational Research (2003) (accepted subject to revision), An extended version previously appeared as Research Report DR 2003/14, Dept. of Statistics and Operations Research, Universitat Politècnica de Catalunya (2003), Available from the author webpage

    Google Scholar 

  7. Cox, L.H.: Network models for complementary cell suppression. J. Am. Stat. Assoc. 90, 1453–1462 (1995)

    Article  MATH  Google Scholar 

  8. Dandekar, R.A.: Cost effective implementation of synthetic tabulation (a.k.a. controlled tabular adjustments) in legacy and new statistical data publication systems. In: Joint ECE/Eurostat Work Session on Statistical Data Confidentiality, Luxembourg (2003), Available from http://www.unece.org/stats/documents/2003.04.confidentiality.htm

  9. Dandekar, R.A., Cox, L.H.: Synthetic tabular data: an alternative to complementary cell suppression. Manuscript, Energy Information Administration, U.S. Department of Energy (2002), Available from the first author on request Ramesh.Dandekar@eia.doe.gov

    Google Scholar 

  10. Dellaert, N.P., Luijten, W.A.: Statistical disclosure in general three-dimensional tables. Statistica Neerlandica 53, 197–221 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  11. Fischetti, M., Salazar, J.J.: Models and algorithms for optimizing cell suppression in tabular data with linear constraints. J. Am. Stat. Assoc. 95, 916–928 (2000)

    Article  Google Scholar 

  12. Fourer, R., Gay, D.M., Kernighan, B.W.: AMPL: A Modeling Language for Mathematical Programming. Duxbury Press, Boston (1993)

    Google Scholar 

  13. Giessing, S.: New tools for cell-suppression in τ-Argus: one piece of the CASC project work draft. In:Joint ECE/Eurostat Work Session on Statistical Data Confidentiality, Skopje (2001)

    Google Scholar 

  14. ILOG CPLEX: ILOG CPLEX 8.0 Reference Manual Library. ILOG (2002)

    Google Scholar 

  15. Kelly, J.P., Golden, B.L., Assad, A.A.: Cell Suppression: disclosure protection for sensitive tabular data. Networks 22, 28–55 (1992)

    Article  Google Scholar 

  16. Wright, S.J.: Primal-Dual Interior-Point Methods. SIAM (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Castro, J. (2004). Computational Experiments with Minimum-Distance Controlled Perturbation Methods. In: Domingo-Ferrer, J., Torra, V. (eds) Privacy in Statistical Databases. PSD 2004. Lecture Notes in Computer Science, vol 3050. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25955-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25955-8_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22118-0

  • Online ISBN: 978-3-540-25955-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics