Page 748

Ming Ding | Information Security and

Privacy Group | Data61, CSIROPrivacy risk assessment –Examples

•The (guaranteed) k-anonymity criterion

The Posterior Probability: Pr[x|y, B]≤1/k

•The differential privacy criterion (the probabilistic N-anonymity)

The Likelihood Probability: Pr[y|x]

Pr[y|x’]≤ 𝑒𝜖

Original data x

(sensitive info: s

non-sensitive info: u)Output/Observation y

(data, query answer, AI/ML

models/parameters, etc.)