Filters








433,637 Hits in 5.7 sec

Anonymity for continuous data publishing

Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei
2008 Proceedings of the 11th international conference on Extending database technology Advances in database technology - EDBT '08  
In practical applications, data is published continuously as new data arrive; the same data may be anonymized differently for a different purpose or a different recipient.  ...  In this paper, we systematically characterize the correspondence attacks and propose an efficient anonymization algorithm to thwart the attacks in the model of continuous data publishing.  ...  Continuous data publishing. Publishing the release R 2 for D 1 ∪ D 2 would permit an analysis on the data over the combined time period of T1 and T2.  ... 
doi:10.1145/1352431.1352466 fatcat:mvyo27u62vcyvn4ti4ndjvcbgq

Anonymity for continuous data publishing

Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei
2008 Proceedings of the 11th international conference on Extending database technology Advances in database technology - EDBT '08  
In practical applications, data is published continuously as new data arrive; the same data may be anonymized differently for a different purpose or a different recipient.  ...  In this paper, we systematically characterize the correspondence attacks and propose an efficient anonymization algorithm to thwart the attacks in the model of continuous data publishing.  ...  Continuous data publishing. Publishing the release R 2 for D 1 ∪ D 2 would permit an analysis on the data over the combined time period of T1 and T2.  ... 
doi:10.1145/1353343.1353378 dblp:conf/edbt/FungWFP08 fatcat:lye3ccsilre4tdx2zm46lfxvva

Continuous privacy preserving publishing of data streams

Bin Zhou, Yi Han, Jian Pei, Bin Jiang, Yufei Tao, Yan Jia
2009 Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology - EDBT '09  
Clearly, k-anonymity of static data is a special case of the continuous privacy preserving stream publishing problem.  ...  Second, in continuous privacy preserving data publishing, time is critical. Once a record arrives, it should be anonymized and published soon.  ... 
doi:10.1145/1516360.1516435 dblp:conf/edbt/ZhouHPJTJ09 fatcat:nphs725it5cxrkovquljc4fblu

Efficient Q-Value Zero-Leakage Protection Scheme in SRS Regularly Publishing Private Data

2019 Tehnički Vjesnik  
The most classic method for protecting SRS data is called as PPMS. However, in the real world, SRS data is growing dynamically and needs to be published regularly.  ...  Before the information is published, it is necessary to anonymize private information in the SRS data to prevent disclosure of individual privacy. There are many privacy protection methods.  ...  Once new data is published, continuous data publishing method [11] needs to anonymize all data. Thus, the data update is too costly.  ... 
doi:10.17559/tv-20181218005415 fatcat:ha6b2untkvhgnfm2jbhhsk7zzu

Privacy Preserving Collaborative Data Publishing

Mohamed Hamdi, Maricel Balitanas
2013 Asia-pacific Journal of Multimedia services convergent with Art Humanities and Sociology  
One solution was proposed for such scenario, based on k-anonymity and cut-tree method for 2-party data.  ...  This paper suggests a simple solution for integrating n-party data using dynamic programming on subsets. The solution is based on thresholds for privacy and informativeness based on k-anonymity.  ...  The values vary for categorical data and continuous data. For continuous data the difference between ranges is taken as the privacy strength of the nodes.  ... 
doi:10.14257/ajmahs.2013.12.06 fatcat:u7hfhzqqvnfu7k3qbx6okhydbe

Broking Systems Based On Cyber-Physical Systems Integration

A.Palani Raj
2018 International Journal for Research in Applied Science and Engineering Technology  
Data will be double encrypted in this research which made the tampering of data, a real complex one.  ...  Not just can these marks be utilized to guarantee realness and secure respectability of work process information, yet in addition to demonstrate the arrangement and intelligent connections, for example  ...  Anonymity for Continuous Data Publishing K-anonymization is an important privacy protection mechanism in data publishing.  ... 
doi:10.22214/ijraset.2018.3255 fatcat:v37t4as6cfd7jhp6qqgsqmsagi

Privacy in mobility data mining

Aris Gkoulalas-Divanis, Yücel Saygin, Dino Pedreschi
2011 SIGKDD Explorations  
, data mining, and privacy.  ...  Last, but not least, we want to acknowledge the support of the MODAP (Mobility, Data Mining, and Privacy) project in our research.  ...  on anonymization methods for privacy-aware trajectory data publishing.  ... 
doi:10.1145/2031331.2031333 fatcat:yyodh5yrjrev5jmpsj6c4ozvb4

Hierarchical anonymization algorithms against background knowledge attack in data releasing

Fatemeh Amiri, Nasser Yazdani, Azadeh Shakery, Amir H. Chinaei
2016 Knowledge-Based Systems  
In this paper, we propose a Bayesian-based anonymization framework to protect against these kinds of background knowledge in a continuous data publishing setting.  ...  Experimental results on two datasets show that our proposed framework outperforms JS-reduce, the state of the art approach for continuous data publishing, in terms of the adversary's information gain as  ...  Acknowledgements This research was supported in part by a grant from the Institute for Research in Fundamental Sciences (no. CS 1398-4-223).  ... 
doi:10.1016/j.knosys.2016.03.004 fatcat:uhwokd2ivbcu7ofqhenedo2tvy

Efficiently Supporting Online Privacy-Preserving Data Publishing in a Distributed Computing Environment

Jong Kim
2021 Applied Sciences  
Most existing privacy-preserving data publishing algorithms consider a scenario in which a data publisher, receiving a request for the release of data containing personal information, anonymizes the data  ...  However, with the increasing demand for the sharing of data among various parties, it is more desirable to integrate the data anonymization functionality into existing systems that are capable of supporting  ...  Then, the system returns the resulting anonymized set to the data publisher who, in turn, releases it for data analytics purposes to data users.  ... 
doi:10.3390/app112210740 fatcat:miggrtotqrg47fba7sbf73u32m

Privacy-Preserving Data Publishing [chapter]

Raymond Ng, Jiawei Han, Anthony Tung, Jie Yang
2008 Constrained Clustering  
Abstract The success of data mining relies on the availability of high quality data.  ...  and, without changing the content, to translate the thesislproject or extended essays, if technically possible, to any medium or format for the purpose of preservation of the digital work.  ...  In contrast, privacy-preserving data publishing does not perf o m the actual data mining task, but concerns itself with how to publish the data so that the anonymized data are useful for data mining.  ... 
doi:10.1201/9781584889977.ch16 fatcat:qm4xllb5ajaorlbdhahjl4yv4m

A Cyber Deception Method Based on Container Identity Information Anonymity

Lingshu LI, Jiangxing WU, Wei ZENG, Xiaotao CHENG
2021 IEICE transactions on information and systems  
As demonstrated by experimental results, the CACF can effectively increase the difficulty for attackers. key words: active defense, network deception, dynamic fingerprints, data flow anonymity  ...  In this study, a proactive fingerprint deception method is proposed, termed as Continuously Anonymizing Containers' Fingerprints (CACF), which modifies the container's fingerprint in the cloud resource  ...  Suppose the input stream is S in , and the data stream after the K-anonymous publishing is S out .  ... 
doi:10.1587/transinf.2020edl8137 fatcat:lsdqlu3t45bejpznww25dpj6pe

Toward Anonymizing IoT Data Streams via Partitioning

Ankhbayar Otgonbayar, Zeeshan Pervez, Keshav Dahal
2016 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)  
In this work, we propose an anonymization algorithm for publishing IoT data streams. Our approach anonymizes tuples with similar description in a single cluster under time based sliding window.  ...  Our experiment on real dataset shows that the proposed algorithm publishes data with less information loss and runs faster compared to conventional anonymization approaches modified to run for IoT data  ...  Static data anonymization is extended to streaming information which renders data in dynamic environment [7, 8] ; data arrive continuously, and anonymized and published in a sequence of time.  ... 
doi:10.1109/mass.2016.049 dblp:conf/mass/OtgonbayarPD16 fatcat:qxshljhm2ndxnkyrpgkicqfxxa

An online framework for publishing privacy-sensitive location traces

Wen Jin, Kristen LeFevre, Jignesh M. Patel
2010 Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access - MobiDE '10  
Within this framework, we develop an initial set of algorithms for continuous privacy-preserving publishing.  ...  This paper studies the problem of protecting individual privacy when continuously publishing a stream of location trace data collected from a population of users.  ...  The problem of continuous location-trace publishing is in some ways related to the problem of k-anonymous trajectory publishing [1, 25, 29] .  ... 
doi:10.1145/1850822.1850824 dblp:conf/mobide/JinLP10 fatcat:7qytwzjh2rbirgihmrxqwiivd4

A Dynamic Programming Approach for Privacy Preserving Collaborative Data Publishing

S.Ram Prasad Reddy, KVSVN Raju, V.Valli Kumari
2011 International Journal of Computer Applications  
One such solution was proposed for such a scenario, based on k-anonymity and cut-tree method for 2-party data.  ...  This paper suggests a simple solution for integrating nparty data using dynamic programming on subsets. The solution is based on thresholds for privacy and informativeness based on k-anonymity.  ...  The values vary for categorical data and continuous data. For continuous data the difference between ranges is taken as the privacy strength of the nodes.  ... 
doi:10.5120/2572-3542 fatcat:2ussdrffand33nulczqgwchl4i

Privacy Preservation Using L-Diversity

A.S. Praveenkumar, S. Kousalya, Dr. K. Thirukumar
2019 IJARCCE  
The personal data can be misused, for a variety of purposes. Maintaining the privacy for high dimensional database has become difficult.  ...  Publication of these data can be useful for research, epidemic studies, commerce development, statistical analysis, etc.  ...  Thus, there is a high demand for Privacy Preserving Data Publishing for protected data sharing via the internet.  ... 
doi:10.17148/ijarcce.2019.8117 fatcat:op2v3tl6s5fjddzyfrnrubzkt4
« Previous Showing results 1 — 15 out of 433,637 results