Ming Ding | Information Security and
Privacy Group | Data61, CSIROPrivacy risk assessment –Examples
•The (guaranteed) k-anonymity criterion
The Posterior Probability: Pr[x|y, B]≤1/k
•The differential privacy criterion (the probabilistic N-anonymity)
The Likelihood Probability: Pr[y|x]
Pr[y|x’]≤ 𝑒𝜖
Original data x
(sensitive info: s
non-sensitive info: u)Output/Observation y
(data, query answer, AI/ML
models/parameters, etc.)