( τ , m )‐ slicedBucket privacy model for sequential anonymization for improving privacy and utility
نویسندگان
چکیده
منابع مشابه
Improving Privacy And Data Utility For High- Dimensional Data By Using Anonymization Technique
Privacy Preserving is one of the significant methods in data mining to hide the sensitive information. Anonymization techniques like generalization and bucketization have been used for privacy preserving. The main problem with generalization is it is not applicable for high-dimensional data and bucketization technique does not avoid membership disclosure. Slicing is one of the novel techniques ...
متن کاملData Anonymization for Privacy Protection
Social networks have become the universal consumer phenomena and have emerged with increasing popularity nowadays. The amount of network data grows enormously due to the increase of networking websites. The development of social networks has led to the increasing demand for the protection of privacy in publishing the social network data as the social network sites are accumulated with large amo...
متن کاملThe Boundary Between Privacy and Utility in Data Anonymization
We consider the privacy problem in data publishing: given a relation I containing sensitive information \anonymize" it to obtain a view V such that, on one hand attackers cannot learn any sensitive information from V , and on the other hand legitimate users can use V to compute useful statistics on I. These are con icting goals. We use a de nition of privacy that is derived from existing ones i...
متن کاملPrivacy, Anonymization, Anomaly Detection
The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or intro...
متن کاملPrivacy Protection for Dynamic Data through Anonymization
Most of the existing privacy-preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are continuous, transient, and usually unbounded. Moreover, in streaming applications, there is a need to offer strong guarantees on the maximum allowed delay between incoming data and the corresponding anonymized output. To ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transactions on Emerging Telecommunications Technologies
سال: 2020
ISSN: 2161-3915,2161-3915
DOI: 10.1002/ett.4130