نتایج جستجو برای: privacy preserving data publishing

تعداد نتایج: 2493154  

Journal: :Proceedings on Privacy Enhancing Technologies 2022

The COVID-19 epidemic has made online video conferencing extremely popular throughout the world, with many schools, companies and government sectors using applications (e.g., Zoom, Google Meet) in a daily basis. These also provide local or cloud recording services, which allow replay sharing of conference recordings (VCRs) later time. Such convenience, however, can easily cause infringement pri...

2010
Dan Lin Sashi Gurung Wei Jiang Ali R. Hurson

We are experiencing the expanding use of location-based services such as AT&T TeleNav GPS Navigator and Intel’s Thing Finder. Existing locationbased services have collected a large amount of location data, which have great potential for statistical usage in applications like traffic flow analysis, infrastructure planning and advertisement dissemination. The key challenge is how to wisely use th...

2009
Xintao Wu Xiaowei Ying Kun Liu Lei Chen

Social networks have received dramatic interest in research and development. In this chapter, we survey the very recent research development on privacy-preserving publishing of graphs and social network data. We categorize the state-of-the-art anonymization methods on simple graphs in three main categories: K-anonymity based privacy preservation via edge modification, probabilistic privacy pres...

2009
Lian Liu Jie Wang Jun Zhang

The issue of data privacy is considered a significant hindrance to the development and industrial applications of database publishing and data mining techniques. Among many privacy-preserving methodologies, data perturbation is a popular technique for achieving a balance between data utility and information privacy. It is known that the attacker’s background information about the original data ...

Journal: :CoRR 2015
Vincent Bindschaedler Reza Shokri

Camouflaging data by generating fake information is a wellknown obfuscation technique for protecting data privacy. The effectiveness of this technique in protecting users’ privacy highly depends on the resemblance of fake information to reality, such that an adversary cannot easily filter such fake information out. In this paper, we focus on a very sensitive and increasingly exposed type of dat...

Journal: :Trans. Data Privacy 2012
Hongwei Tian Weining Zhang Shouhuai Xu Patrick Sharkey

Privacy-preserving data mining (PPDM) is an important problem and is currently studied in three approaches: the cryptographic approach, the data publishing, and the model publishing. However, each of these approaches has some problems. The cryptographic approach does not protect privacy of learned knowledge models and may have performance and scalability issues. The data publishing, although is...

Journal: :IEEE Computational Intelligence Magazine 2008

Journal: :Mathematical and Computer Modelling 2005

2014
P. Gayathri

The large amount of data is used in corporate and government institution. The sequence of releases is more identify by adversary. So, the user’s privacy is violated. To avoid this to use privacy protection techniques are applied here. Privacy preserving serial data publishing on dynamic databases has relied on unrealistic assumptions of the nature of dynamic databases. In many applications, som...

2008
Ming Hua Jian Pei

As a serious concern in data publishing and analysis, privacy preserving data processing has received a lot of attention. Privacy preservation often leads to information loss. Consequently, we want to minimize utility loss as long as the privacy is preserved. In this chapter, we survey the utility-based privacy preservation methods systematically. We first briefly discuss the privacy models and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید