Privacy Inference Disclosure Control with Access- Unrestricted Data Anonymity1

نویسنده

  • Zude Li
چکیده

The term “privacy” is generally used as “the right to select what personal information about me is known to what people” (Westin, 1976). In a technical view, data privacy protection is to manage individual data in a privacy aware way, including determination of when, how and to what extent such data can be communicated to others with what special features. Privacy is becoming a hot concern for both individuals and organizations. In the past thirty years, a lot of research studies have been contributed to data privacy. Roughly, these studies can be classified into two types: access-restricted and access-unrestricted. The access-restricted type focuses on how to protect privacy through restricting user access to the private data: A user can access the data only if he/ she satisfies the access constraints predefined on the data. The access-unrestricted type concerns on data publication, making them oriented to most users and at the same time avoiding possibly compromised privacy disclosure. In the access-restricted type studies, researchers usually AbstrAct

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance

Traditional access control models protect sensitive data from unauthorised direct accesses; however, they fail to prevent indirect inferences. Information disclosure via inference channels occurs when secret information is derived from unclassified (non-secure) information and other sources like metadata and public observations. Previously, techniques using precise and fuzzy functional dependen...

متن کامل

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

Privacy in Cyberspace

Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents incl...

متن کامل

A New Method for Protecting Interrelated Time Series with Bayesian Prior Distributions and Synthetic Data

Organizations disseminate statistical summaries of administrative data via the Web for unrestricted public use. They balance the trade-off between confidentiality protection and inference quality. Recent developments in disclosure avoidance techniques include the incorporation of synthetic data, which capture the essential features of underlying data by releasing altered data generated from a p...

متن کامل

Data Access, Data Utility, and Disclosure Risk are NOT Always Mutually Exclusive Descriptive Summary to Accompany Presentation at NSF Workshop on Confidentiality May 12-13, 2003 Washington DC

Traditionally, it has been assumed that providing greater data access and/or data utility results in lower privacy/confidentiality. Hence, there is a general feeling that there is no way to provide complete data access and high data utility while also maintaining a low level of disclosure risk. Our research in this area has shown that it is possible to achieve both objectives for confidential n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016