Privacy Protection for Dynamic Data through Anonymization

نویسندگان

  • K. Vinay Kumar
  • N. Sandeep Kumar
  • Vishnu Vardhan
چکیده

Most of the existing privacy-preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are continuous, transient, and usually unbounded. Moreover, in streaming applications, there is a need to offer strong guarantees on the maximum allowed delay between incoming data and the corresponding anonymized output. To cope with these requirements, in this project, we present Continuously Anonymizing Streaming data via adaptive clustering; a clusterbased scheme that anonymizes data streams on-the-fly and, at the same time, ensures the freshness of the anonymized data by satisfying specified delay constraints.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Consensus in Anonymization Systems via Game Theory

Privacy protection appears as a fundamental concern when personal data is collected, stored, and published. Several anonymization methods have been proposed to address privacy issues in private datasets. Every anonymization method has at least one parameter to adjust the level of privacy protection considering some utility for the collected data. Choosing a desirable level of privacy protection...

متن کامل

A novel anonymization algorithm: Privacy protection and knowledge preservation

In data mining and knowledge discovery, there are two conflicting goals: privacy protection and knowledge preservation. On the one hand, we anonymize data to protect privacy; on the other hand, we allow miners to discover useful knowledge from anonymized data. In this paper, we present an anonymization method which provides both privacy protection and knowledge preservation. Unlike most anonymi...

متن کامل

Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education

This article is a case study in the design, implementation, and deployment of the Bugnosis privacy enhancing tool. Downloaded and installed by over 100,000 users to date, Bugnosis contributes to network privacy indirectly | without any technical protection measures such as ltering or anonymization | by raising awareness about Web bugs and arming users with speci c information about current Web ...

متن کامل

Search Query Privacy: The Problem of Anonymization

This paper presents several arguments that the deletion or anonymization of search query data is problematic. A more balanced approach would lead to a more uniform solution to data protection in which maintaining search query privacy would not sacrifice the benefits of long-term, confidential storage of the data.

متن کامل

Data-driven Anonymization Process Applied to Time Series

Digital transformation and Big Data allow the use of highly valuable data. However, these data can be individual or sensitive, and represent an obvious threat for privacy. Anonymization, which achieves a trade-off between data protection and data utility, can be used in this context. There is not global anonymization technique which fits at all applications. Here, we describe a data-driven anon...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012