نتایج جستجو برای: privacy preservation

تعداد نتایج: 116916  

Journal: :International Journal of Computer Applications 2014

Hasan Alizadeh Narges Naderi

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

2010
Feng Gao Jingsha He Shufen Peng

During data sharing process across people, users do not want the information that contains privacy to be shared with everyone else; some people may only want to share it with someone they are familiar with. To solve this issue of privacy preservation in data-sharing applications, we propose a novel user-centric method. Our main contributions include the followings. (1) Users can select key word...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :International Journal of Computer Applications 2014

2008
Charu C. Aggarwal Philip S. Yu

In recent years, privacy-preserving data mining has been studied extensively, because of the wide proliferation of sensitive information on the internet. A number of algorithmic techniques have been designed for privacy-preserving data mining. In this paper, we provide a review of the state-of-the-art methods for privacy. We discuss methods for randomization, k-anonymization, and distributed pr...

Hasan Alizadeh Narges Naderi

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

Journal: :JCSE 2011
Ling Guo Xiaowei Ying Xintao Wu

Privacy preserving microdata publication has received wide attention. In this paper, we investigate the randomization approach and focus on attribute disclosure under linking attacks. We give efficient solutions to determine optimal distortion parameters, such that we can maximize utility preservation while still satisfying privacy requirements. We compare our randomization approach with l-dive...

2014
Chidananda Murthy

Cloud is a very hot topic currently being discussed in the new era of technology. Organizations step back from adapting cloud technology mainly because of the security and privacy concerns. Processing or sharing privacy-sensitive data sets on cloud probably engenders severe privacy concerns because of multi-tenancy. Lack of transparency attack where the flow of client’s data is not known and di...

Journal: :Expert Syst. Appl. 2010
Weijia Yang Sanzheng Qiao

In data mining and knowledge discovery, there are two conflicting goals: privacy protection and knowledge preservation. On the one hand, we anonymize data to protect privacy; on the other hand, we allow miners to discover useful knowledge from anonymized data. In this paper, we present an anonymization method which provides both privacy protection and knowledge preservation. Unlike most anonymi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید