Privacy Inference Disclosure Control with Access- Unrestricted Data Anonymity1
نویسنده
چکیده
The term “privacy” is generally used as “the right to select what personal information about me is known to what people” (Westin, 1976). In a technical view, data privacy protection is to manage individual data in a privacy aware way, including determination of when, how and to what extent such data can be communicated to others with what special features. Privacy is becoming a hot concern for both individuals and organizations. In the past thirty years, a lot of research studies have been contributed to data privacy. Roughly, these studies can be classified into two types: access-restricted and access-unrestricted. The access-restricted type focuses on how to protect privacy through restricting user access to the private data: A user can access the data only if he/ she satisfies the access constraints predefined on the data. The access-unrestricted type concerns on data publication, making them oriented to most users and at the same time avoiding possibly compromised privacy disclosure. In the access-restricted type studies, researchers usually AbstrAct
منابع مشابه
Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance
Traditional access control models protect sensitive data from unauthorised direct accesses; however, they fail to prevent indirect inferences. Information disclosure via inference channels occurs when secret information is derived from unclassified (non-secure) information and other sources like metadata and public observations. Previously, techniques using precise and fuzzy functional dependen...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملPrivacy in Cyberspace
Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents incl...
متن کاملA New Method for Protecting Interrelated Time Series with Bayesian Prior Distributions and Synthetic Data
Organizations disseminate statistical summaries of administrative data via the Web for unrestricted public use. They balance the trade-off between confidentiality protection and inference quality. Recent developments in disclosure avoidance techniques include the incorporation of synthetic data, which capture the essential features of underlying data by releasing altered data generated from a p...
متن کاملData Access, Data Utility, and Disclosure Risk are NOT Always Mutually Exclusive Descriptive Summary to Accompany Presentation at NSF Workshop on Confidentiality May 12-13, 2003 Washington DC
Traditionally, it has been assumed that providing greater data access and/or data utility results in lower privacy/confidentiality. Hence, there is a general feeling that there is no way to provide complete data access and high data utility while also maintaining a low level of disclosure risk. Our research in this area has shown that it is possible to achieve both objectives for confidential n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016